Vulnerability Name:

CVE-2007-5045 (CCN-35178)

Assigned:2006-06-20
Published:2006-06-20
Updated:2018-10-15
Summary:Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox "-chrome" argument.
Note: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.4 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
4.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-94
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Wed Sep 20 2006 - 16:49:41 CDT
Backdooring MP3 files (plus QuickTime issues and Cross-context Scripting)

Source: CCN
Type: BugTraq Mailing List, Wed Dec 06 2006 - 21:29:38 CST
New MySpace worm could be on its way

Source: CCN
Type: BugTraq Mailing List, Wed Sep 12 2007 - 07:13:00 CDT
0DAY: QuickTime pwns Firefox

Source: MITRE
Type: CNA
CVE-2006-4965

Source: MITRE
Type: CNA
CVE-2007-5045

Source: CCN
Type: Apple Web site
About the security content of QuickTime 7.1.5

Source: HP
Type: UNKNOWN
HPSBUX02153

Source: CCN
Type: SA22048
Apple QuickTime "qtnext" Input Validation Vulnerability

Source: CCN
Type: SA26881
Firefox "-chrome" Parameter Security Issue

Source: SECUNIA
Type: Patch, Vendor Advisory
26881

Source: CCN
Type: SECTRACK ID: 1018687
QuickTime `qtnext` Parameter Lets Remote Users Execute Arbitrary Commands

Source: SUNALERT
Type: UNKNOWN
201516

Source: CCN
Type: ASA-2008-008
Multiple Security Vulnerabilities in Firefox and Thunderbird for Solaris 10 May Allow Execution of Arbitrary Code and Access to Unauthorized Data (Sun 103177)

Source: MISC
Type: UNKNOWN
http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox

Source: CCN
Type: US-CERT VU#751808
Apple QuickTime remote command execution vulnerability

Source: CCN
Type: MFSA 2007-28
Code execution via QuickTime Media-link files

Source: CONFIRM
Type: Patch
http://www.mozilla.org/security/announce/2007/mfsa2007-28.html

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:057

Source: CCN
Type: OSVDB ID: 29064
Apple QuickTime Plug-In .qtl File qtnext Field XCS

Source: CCN
Type: OSVDB ID: 40434
Apple Quicktime for Windows Crafted QTL File qtnext Field Remote Command Execution

Source: BUGTRAQ
Type: UNKNOWN
20070912 0DAY: QuickTime pwns Firefox

Source: CCN
Type: BID-20138
Apple QuickTime Plug-In Arbitrary Script Execution Weakness

Source: VUPEN
Type: UNKNOWN
ADV-2007-3197

Source: MISC
Type: UNKNOWN
https://bugzilla.mozilla.org/show_bug.cgi?id=395942

Source: XF
Type: UNKNOWN
quicktime-qtl-security-bypass(35178)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5896

Source: SUSE
Type: SUSE-SA:2007:057
Mozilla Security Update

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:quicktime:*:*:*:*:*:*:*:* (Version <= 7.1.5)
  • OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version <= 2.0.0.6)

  • Configuration CCN 1:
  • cpe:/a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5896
    V
    HP-UX Running Firefox, Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS)
    2014-03-24
    BACK
    apple quicktime *
    mozilla firefox *
    apple quicktime 7.1.3
    suse linux enterprise server 8
    suse suse linux school server -
    novell linux desktop 9
    novell open enterprise server *
    suse suse linux 10.0
    suse suse linux 10.1
    novell suse linux enterprise server 10 sp2
    turbolinux turbolinux fuji
    novell open enterprise server *
    novell opensuse 10.2
    novell opensuse 10.3