Vulnerability Note VU#434748
Apple QuickTime for Java information disclosure vulnerability
Overview
Apple QuickTime for Java fails to properly clear memory. As a result, sensitive information may be exposed to unintended parties.
Description
Apple QuickTime includes the ability to integrate QuickTime into Java applications and applets. This feature is known as QuickTime for Java. Apple QuickTime for Java fails to properly clear the contents of memory when it is released. More information is available in About Security Update (QuickTime 7.1.6). |
Impact
By convincing a user to run a malicious Java applet, a remote, unauthenticated attacker may be able to access sensitive information about that user. This can be accomplished by visiting a malicious web page with a Java-enabled web browser. |
Solution
Apply an update |
Disable Java |
Systems Affected (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
Apple Computer, Inc. | Affected | - | 30 May 2007 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A | N/A |
References
- http://www.us-cert.gov/reading_room/securing_browser/#Safari
- http://docs.info.apple.com/article.html?artnum=305531
- http://secunia.com/advisories/25130/
- http://docs.info.apple.com/article.html?artnum=304263
- http://developer.apple.com/quicktime/qtjava/
- http://www.apple.com/support/downloads/
- http://secunia.com/advisories/25130/
Credit
This vulnerability was reported in About Security Update (QuickTime 7.1.6).
Other Information
- CVE IDs: CVE-2007-2389
- Date Public: 29 May 2007
- Date First Published: 30 May 2007
- Date Last Updated: 30 May 2007
- Severity Metric: 2.97
- Document Revision: 11
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.