Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for Quicktime < 7.0.4 on Windows
Detailed Explanation for this Vulnerability Assessment
The remote version of QuickTime is affected by multiple code execution
The remote Windows host is running a version of Quicktime prior to
The remote version of Quicktime is vulnerable to various buffer
overflows involving specially-crafted image and media files. An
attacker may be able to leverage these issues to execute arbitrary
code on the remote host by sending a malformed file to a victim and
have him open it using QuickTime player.
See also :
Upgrade to Quicktime version 7.0.4 or later.
Network Security Threat Level:
High / CVSS Base Score : 7.0
Networks Security ID: 16202
Vulnerability Assessment Copyright: This script is Copyright (C) 2006-2007 Tenable Network Security
|RadiSys AMC-7211 Single MidSize Quad Gigabit Ethernet Module + SFP Transceivers
|StarTech.com Gigabit Fiber SFP 550m Transceiver Module (Cisco GLC-LH-SMD Comp...
|SolarFlare SOLRQSFP2SFP3M Twin axial Direct Attach Cable
|Brocade SFP+ Copper Cable - SFP+ Network - 3.28ft
No Discussions have been posted on this vulnerability.