Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-1585

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2008-1585
Last Modified 07 Mar 2011 10:07:19
Published 10 Jun 2008 02:32:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-1585

Summary

Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.

Vulnerable Systems

Application

  • Apple Quicktime 7.4.5


References

CERT - TA08-162C

CERT-VN - VU#132419

APPLE - APPLE-SA-2008-06-09

XF - quicktime-quicktime-content-code-execution(42948)

MISC - http://www.zerodayinitiative.com/advisories/ZDI-08-038/

VUPEN - ADV-2008-2064

VUPEN - ADV-2008-1776

SECTRACK - 1020217

BID - 29650

BID - 29619

BUGTRAQ - 20080610 ZDI-08-038: QuickTime SMIL qtnext Redirect File Execution

CONFIRM - http://support.apple.com/kb/HT1991

SECUNIA - 31034

SECUNIA - 29293

APPLE - APPLE-SA-2008-07-10

Related Patches

Apple 2008-06-09 QuickTime 7.5 for Panther

Apple 2008-06-09 QuickTime 7.5 for Tiger

Apple 2008-06-09 QuickTime 7.5 for Leopard


Last Updated: 27 May 2016 10:47:35