| CVE ID | CVE-2011-0250 | 
| CVSS SCORE | 9.0, AV:N/AC:L/Au:N/C:P/I:P/A:C | 
| AFFECTED VENDORS | 
                            
                            
                            Apple | 
                    
| AFFECTED PRODUCTS | 
                            
                            
                            Quicktime | 
                    
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['11218']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com | 
| VULNERABILITY DETAILS | 
                             This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles invalid values in the Sync Sample Atom. Due to a signed compare instead of an unsigned compare it is possible to corrupt the Sample Atom Table. Values from this table are later used to populate a heap buffer and the corrupted value causes a heap overflow. This can result in remote code execution under the context of the current user.  | 
                    
| ADDITIONAL DETAILS | 
                            
                            
                            Apple has issued an update to correct this vulnerability. More details can be found at:
                             http://support.apple.com/kb/HT4826  | 
                    
| DISCLOSURE TIMELINE | 
                            
  | 
                    
| CREDIT | Matt "j00ru" Jurczyk |