Vulnerability Note VU#112553
Apple QuickTime Player for Windows contains buffer overflow in processing of overly long QuickTime URLs
Apple's QuickTime Player is a player for files and streaming media in the QuickTime format. Versions of the player are available for both the Microsoft Windows and Apple MacOS platforms. A flaw in the version for Windows could allow a remote attacker to execute arbitrary code on a vulnerable system.
A buffer overflow exists in the QuickTime Player for Windows' handling of overly long URL of the type quicktime://... A specially crafted URL consisting of a long string of characters can cause the QuickTime Player to crash or allow an attacker to execute arbitrary code of their choosing with the privileges of the user running the QuickTime Player.
The URL containing the exploit code may be hosted on a webpage, introduced via HTML email, or presented to the user in another fashion that encourages them to browse to it.
If the QuickTime player software is instructed to load a URL that is specially crafted by an attacker, arbitrary code can be executed under the privileges of the QuickTime user. This crafted URL may be supplied on a webpage or in email for the victim to select, or some other means designed to encourage them to invoke the QuickTime Player using the exploit URL.
Apply a patch from the vendor
Removing the QuickTime handler from the web browser or removing the HKEY_CLASSES_ROOT/quicktime registry key may prevent automatic exploitation through HTML pages.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer Inc.||Affected||-||01 Apr 2003|
CVSS Metrics (Learn More)
This document was written by Chad R Dougherty.
- CVE IDs: CAN-2003-0168
- Date Public: 31 Mar 2003
- Date First Published: 01 Apr 2003
- Date Last Updated: 01 Apr 2003
- Severity Metric: 15.68
- Document Revision: 6
If you have feedback, comments, or additional information about this vulnerability, please send us email.