Vulnerability Name: | CVE-2007-4676 (CCN-38281) | ||||||||
Assigned: | 2007-11-05 | ||||||||
Published: | 2007-11-05 | ||||||||
Updated: | 2018-10-26 | ||||||||
Summary: | Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via malformed elements when parsing (1) Poly type (0x0070 through 0x0074) and (2) PackBitsRgn field (0x0099) opcodes in a PICT image. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-4676 Source: CCN Type: Apple Web site About the security content of QuickTime 7.3 Source: CONFIRM Type: Vendor Advisory http://docs.info.apple.com/article.html?artnum=306896 Source: APPLE Type: Vendor Advisory APPLE-SA-2007-11-05 Source: OSVDB Type: Broken Link 38546 Source: CCN Type: SA27523 Apple QuickTime Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 27523 Source: SREASON Type: Third Party Advisory 3351 Source: CCN Type: SECTRACK ID: 1018894 QuickTime Movie/PICT/QTVR/Java Bugs Let Remote Users Execute Arbitrary Code Source: CCN Type: Apple QuickTime Web site Apple - QuickTime Source: CCN Type: US-CERT VU#690515 Apple QuickTime buffer overflow vulnerability Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#690515 Source: CCN Type: OSVDB ID: 38546 Apple QuickTime PICT Image Handling Multiple Element Parsing Overflow Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20071105 ZDI-07-066: Apple Quicktime PICT File PackBitsRgn Parsing Heap Corruption Vulnerability Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20071105 ZDI-07-067: Apple QuickTime PICT File Poly Opcodes Heap Corruption Vulnerability Source: BID Type: Third Party Advisory, VDB Entry 26345 Source: CCN Type: BID-26345 Apple QuickTime PICT Image Remote Multiple Heap Buffer Overflow Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1018894 Source: CERT Type: Third Party Advisory, US Government Resource TA07-310A Source: VUPEN Type: Third Party Advisory ADV-2007-3723 Source: MISC Type: Third Party Advisory, VDB Entry http://www.zerodayinitiative.com/advisories/ZDI-07-066.html Source: MISC Type: Third Party Advisory, VDB Entry http://www.zerodayinitiative.com/advisories/ZDI-07-067.html Source: XF Type: Third Party Advisory, VDB Entry quicktime-packbitsrgn-bo(38280) Source: XF Type: Third Party Advisory, VDB Entry quicktime-poly-type-bo(38281) Source: XF Type: UNKNOWN quicktime-poly-type-bo(38281) Source: CCN Type: ZDI-07-067 Apple QuickTime PICT File Poly Opcodes Heap Corruption Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |