CVE-2007-4675

Heap-based buffer overflow in the QuickTime VR extension 7.2.0.240 in QuickTime.qts in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via a QTVR (QuickTime Virtual Reality) movie file containing a large size field in the atom header of a panorama sample atom.
References
Link Resource
http://blog.48bits.com/?p=176 Third Party Advisory
http://docs.info.apple.com/article.html?artnum=306896 Vendor Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=620 Broken Link
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html Patch Vendor Advisory
http://secunia.com/advisories/27523 Third Party Advisory
http://www.48bits.com/advisories/qt_pdat_heapbof.pdf Third Party Advisory
http://www.osvdb.org/38545 Broken Link
http://www.securityfocus.com/archive/1/483564/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/26342 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018894 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-310A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/3723 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38282 Third Party Advisory VDB Entry
http://blog.48bits.com/?p=176 Third Party Advisory
http://docs.info.apple.com/article.html?artnum=306896 Vendor Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=620 Broken Link
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html Patch Vendor Advisory
http://secunia.com/advisories/27523 Third Party Advisory
http://www.48bits.com/advisories/qt_pdat_heapbof.pdf Third Party Advisory
http://www.osvdb.org/38545 Broken Link
http://www.securityfocus.com/archive/1/483564/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/26342 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018894 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-310A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/3723 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38282 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://blog.48bits.com/?p=176 - Third Party Advisory () http://blog.48bits.com/?p=176 - Third Party Advisory
References () http://docs.info.apple.com/article.html?artnum=306896 - Vendor Advisory () http://docs.info.apple.com/article.html?artnum=306896 - Vendor Advisory
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=620 - Broken Link () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=620 - Broken Link
References () http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html - Patch, Vendor Advisory
References () http://secunia.com/advisories/27523 - Third Party Advisory () http://secunia.com/advisories/27523 - Third Party Advisory
References () http://www.48bits.com/advisories/qt_pdat_heapbof.pdf - Third Party Advisory () http://www.48bits.com/advisories/qt_pdat_heapbof.pdf - Third Party Advisory
References () http://www.osvdb.org/38545 - Broken Link () http://www.osvdb.org/38545 - Broken Link
References () http://www.securityfocus.com/archive/1/483564/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/483564/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/26342 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/26342 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1018894 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1018894 - Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA07-310A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-310A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2007/3723 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/3723 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/38282 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/38282 - Third Party Advisory, VDB Entry

Information

Published : 2007-11-07 23:46

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4675

Mitre link : CVE-2007-4675

CVE.ORG link : CVE-2007-4675


JSON object : View

Products Affected

apple

  • mac_os_x
  • quicktime

microsoft

  • windows_vista
  • windows_xp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer