CVE-2006-4965
Apple QuickTime 7.1.3 PlugIn - Arbitrary Script Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain. NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.
Apple QuickTime 7.1.3 Player y sus plug-ins permiten a un atacante remoto ejecutar código JavaScript de su elección y posiblemente llevar a cabo otros ataques mediante un archivo QuickTime Media Link (QTL) con un elemento XML embebido y un parámetro qtnext que identifica recursos fuera del dominio original. NOTA: a fecha del 12-09-2007, este problema fue demostrado utilizando instancias de Components.interfaces.nsILocalFile y Components.interfaces.nsIProcess para ejecutar archivos locales de su elección en Firefox y posiblemente Internet Explorer.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-09-21 First Exploit
- 2006-09-24 CVE Reserved
- 2006-09-25 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://docs.info.apple.com/article.html?artnum=305149 | X_refsource_confirm | |
http://securityreason.com/securityalert/1631 | Third Party Advisory | |
http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox | X_refsource_misc | |
http://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up | X_refsource_misc | |
http://www.kb.cert.org/vuls/id/751808 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/446750/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/453756/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/479179/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1018687 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/3155 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/28639 | 2006-09-21 | |
http://secunia.com/advisories/22048 | 2024-08-07 | |
http://www.gnucitizen.org/blog/backdooring-mp3-files | 2024-08-07 | |
http://www.securityfocus.com/bid/20138 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html | 2018-10-17 | |
http://secunia.com/advisories/27414 | 2018-10-17 |