Apple QuickTime for Java 7.1.6 on Mac OS X and Windows does not properly restrict QTObject subclassing, which allows remote attackers to execute arbitrary code via a web page containing a user-defined class that accesses unsafe functions that can be leveraged to write to arbitrary memory locations.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2007/May/msg00005.html | |
http://secunia.com/secunia_research/2007-52/advisory/ | Vendor Advisory |
http://www.kb.cert.org/vuls/id/995836 | US Government Resource |
http://www.securityfocus.com/bid/24221 | |
http://www.osvdb.org/35576 | |
http://www.securitytracker.com/id?1018136 | |
http://secunia.com/advisories/25130 | Vendor Advisory |
http://www.vupen.com/english/advisories/2007/1974 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2007-05-29 14:30
Updated : 2011-05-17 21:00
NVD link : CVE-2007-2388
Mitre link : CVE-2007-2388
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
apple
- mac_os_x
- quicktime
microsoft
- all_windows