Vulnerability Note VU#319771

Apple QuickTime for Java may allow Java applets to gain elevated privileges

Original Release date: 08 Nov 2007 | Last revised: 08 Nov 2007


Apple QuickTime for Java contains a vulnerability that may allow a malicious Java applet to gain elevated privileges.


Apple QuickTime is a media player that includes a browser plugin. QuickTime for Java provides APIs which allow Java developers to include multimedia in Java applets.

From Apple Article ID: 306896 "About the security content of QuickTime 7.3":

    Multiple vulnerabilities exist in QuickTime for Java, which may allow untrusted Java applets to obtain elevated privileges. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker may cause the disclosure of sensitive information and arbitrary code execution with elevated privileges. This update addresses the issues by making QuickTime for Java no longer accessible to untrusted Java applets. Credit to Adam Gowdiak for reporting this issue.

To exploit this vulnerability, an attacker would have to convince a user to open a specially crafted Java applet which could be hosted on a webpage.


A remote, unauthenticated attacker may be able to take any action that the user running QuickTime can.


Apple has addressed this issue in QuickTime 7.3.

Disable Java
Until updates can be applied, disabling the Java plugin may mitigate this vulnerability. For instructions on how to disable Java in your browser, see Securing Your Web Browser.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-08 Nov 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Apple credits Adam Gowdiak for reporting this issue

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2007-3751
  • Date Public: 05 Nov 2007
  • Date First Published: 08 Nov 2007
  • Date Last Updated: 08 Nov 2007
  • Severity Metric: 7.53
  • Document Revision: 4


If you have feedback, comments, or additional information about this vulnerability, please send us email.