HTTP: Apple QuickTime for Java toQTPointer Function Memory Corruption

This signature detects attempts to exploit a known vulnerability against Apple Quicktime for Java. A successful attack can lead to arbitrary code execution.

Extended Description

QuickTime is prone to a vulnerability that may aid in the remote compromise of a vulnerable computer. The issue occurs when a Java-enabled browser is used to view a malicious website. QuickTime must also be installed. Attackers may exploit this issue to execute arbitrary code in the context of a user running the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions. This issue is exploitable through both Safari and Mozilla Firefox running on Mac OS X. Reports indicate that Firefox on Windows platforms may also be an exploit vector. Reports also indicate that Internet Explorer 6 and 7 running on Windows XP may be an exploit vector, but that a sandboxing feature may interfere with successful exploits. Neither of these points has been confirmed.

Affected Products

Apple quicktime_player

Short Name
HTTP:STC:DL:QT-TOQTPOINTER
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apple CVE-2007-2175 Corruption Function Java Memory QuickTime for toQTPointer
Release Date
10/06/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3733
False Positive
Unknown
Vendors

Apple

CVSS Score

7.6

Found a potential security threat?