Vulnerability Name: | CVE-2007-5045 (CCN-35178) | ||||||||
Assigned: | 2006-06-20 | ||||||||
Published: | 2006-06-20 | ||||||||
Updated: | 2018-10-15 | ||||||||
Summary: | Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox "-chrome" argument. Note: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 8.4 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:UR)
4.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-94 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Wed Sep 20 2006 - 16:49:41 CDT Backdooring MP3 files (plus QuickTime issues and Cross-context Scripting) Source: CCN Type: BugTraq Mailing List, Wed Dec 06 2006 - 21:29:38 CST New MySpace worm could be on its way Source: CCN Type: BugTraq Mailing List, Wed Sep 12 2007 - 07:13:00 CDT 0DAY: QuickTime pwns Firefox Source: MITRE Type: CNA CVE-2006-4965 Source: MITRE Type: CNA CVE-2007-5045 Source: CCN Type: Apple Web site About the security content of QuickTime 7.1.5 Source: HP Type: UNKNOWN HPSBUX02153 Source: CCN Type: SA22048 Apple QuickTime "qtnext" Input Validation Vulnerability Source: CCN Type: SA26881 Firefox "-chrome" Parameter Security Issue Source: SECUNIA Type: Patch, Vendor Advisory 26881 Source: CCN Type: SECTRACK ID: 1018687 QuickTime `qtnext` Parameter Lets Remote Users Execute Arbitrary Commands Source: SUNALERT Type: UNKNOWN 201516 Source: CCN Type: ASA-2008-008 Multiple Security Vulnerabilities in Firefox and Thunderbird for Solaris 10 May Allow Execution of Arbitrary Code and Access to Unauthorized Data (Sun 103177) Source: MISC Type: UNKNOWN http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox Source: CCN Type: US-CERT VU#751808 Apple QuickTime remote command execution vulnerability Source: CCN Type: MFSA 2007-28 Code execution via QuickTime Media-link files Source: CONFIRM Type: Patch http://www.mozilla.org/security/announce/2007/mfsa2007-28.html Source: SUSE Type: UNKNOWN SUSE-SA:2007:057 Source: CCN Type: OSVDB ID: 29064 Apple QuickTime Plug-In .qtl File qtnext Field XCS Source: CCN Type: OSVDB ID: 40434 Apple Quicktime for Windows Crafted QTL File qtnext Field Remote Command Execution Source: BUGTRAQ Type: UNKNOWN 20070912 0DAY: QuickTime pwns Firefox Source: CCN Type: BID-20138 Apple QuickTime Plug-In Arbitrary Script Execution Weakness Source: VUPEN Type: UNKNOWN ADV-2007-3197 Source: MISC Type: UNKNOWN https://bugzilla.mozilla.org/show_bug.cgi?id=395942 Source: XF Type: UNKNOWN quicktime-qtl-security-bypass(35178) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:5896 Source: SUSE Type: SUSE-SA:2007:057 Mozilla Security Update | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |