Short Name |
HTTP:STC:QTIME-TEXTBOX-MEMC
|
Severity |
High
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
Apple QuickTime TeXML textBox Element Remote Code Execution
|
Release Date |
2013/06/27
|
Update Number |
2277
|
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+
|
HTTP: Apple QuickTime TeXML textBox Element Remote Code Execution
This signature detects attempts to exploit a known vulnerability against Apple QuickTime. A successful attack can lead to arbitrary code execution.
Extended Description
Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TeXML file.
Affected Products
- apple quicktime 3.0
- apple quicktime 4.1.2
- apple quicktime 5.0
- apple quicktime 5.0.1
- apple quicktime 5.0.2
- apple quicktime 6.0
- apple quicktime 6.0.0
- apple quicktime 6.0.1
- apple quicktime 6.0.2
- apple quicktime 6.1
- apple quicktime 6.1.0
- apple quicktime 6.1.1
- apple quicktime 6.2.0
- apple quicktime 6.3.0
- apple quicktime 6.4.0
- apple quicktime 6.5
- apple quicktime 6.5.0
- apple quicktime 6.5.1
- apple quicktime 6.5.2
- apple quicktime 7.0.0
- apple quicktime 7.0.1
- apple quicktime 7.0.2
- apple quicktime 7.0.3
- apple quicktime 7.0.4
- apple quicktime 7.1.0
- apple quicktime 7.1.1
- apple quicktime 7.1.2
- apple quicktime 7.1.3
- apple quicktime 7.1.4
- apple quicktime 7.1.5
- apple quicktime 7.1.6
- apple quicktime 7.2.0
- apple quicktime 7.2.1
- apple quicktime 7.3.0
- apple quicktime 7.3.1
- apple quicktime 7.4.0
- apple quicktime 7.4.1
- apple quicktime 7.4.5
- apple quicktime 7.5.0
- apple quicktime 7.5.5
- apple quicktime 7.6.0
- apple quicktime 7.6.1
- apple quicktime 7.6.2
- apple quicktime 7.6.5
- apple quicktime 7.6.6
- apple quicktime 7.6.7
- apple quicktime 7.6.8
- apple quicktime 7.6.9
- apple quicktime 7.7.0
- apple quicktime 7.7.1
- apple quicktime 7.7.2
- apple quicktime up to 7.7.3
References