CVE ID | CVE-2010-3792 |
CVSS SCORE | 9.0, AV:N/AC:L/Au:N/C:P/I:P/A:C |
AFFECTED VENDORS |
Apple |
AFFECTED PRODUCTS |
Quicktime |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10617']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the quicktime.qtx. When handling the m1s atom an integer value is used as an offset into a buffer. Minimal validation is done and an attacker can supply a negative value. This can be used to write to an arbitrary address in process memory. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the user. |
ADDITIONAL DETAILS |
Fixed in |
DISCLOSURE TIMELINE |
|
CREDIT | Anonymous |