Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.MACOSX_QUICKTIME701.NASL
HistoryJun 17, 2005 - 12:00 a.m.

Quicktime < 7.0.1 Quartz Composer Information Disclosure (Mac OS X)

2005-06-1700:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
7

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

78.5%

The remote Mac OS X host is running a version of Quicktime 7 which is older than Quicktime 7.0.1. The remote version of this software is vulnerable to an information disclosure flaw when handling Quartz Composer files which may leak data to an arbitrary web location.

To exploit this flaw, an attacker would need to lure a user on the remote host into viewing a specially crafted Quartz Composer object.

#
# (C) Tenable Network Security, Inc.
#

if ( ! defined_func("bn_random") ) exit(0);

include("compat.inc");

if(description)
{
 script_id(18521);
 script_version ("1.19");
 script_cve_id("CVE-2005-1579");
 script_bugtraq_id(13603);

 script_name(english:"Quicktime < 7.0.1 Quartz Composer Information Disclosure (Mac OS X)");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by an information
disclosure vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote Mac OS X host is running a version of Quicktime 7 which is
older than Quicktime 7.0.1. The remote version of this software is 
vulnerable to an information disclosure flaw when handling Quartz 
Composer files which may leak data to an arbitrary web location.

To exploit this flaw, an attacker would need to lure a user on the 
remote host into viewing a specially crafted Quartz Composer object." );
 script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2005/May/msg00006.html" );
 script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/advisories/8642" );
 script_set_attribute(attribute:"solution", value:
"Install Quicktime 7.0.1" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/06/17");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/11");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/05/31");
 script_cvs_date("Date: 2018/07/14  1:59:35");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime");
script_end_attributes();

 script_summary(english:"Check for Quicktime 7.0.1");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"MacOS X Local Security Checks");
 script_dependencies("macosx_Quicktime652.nasl");
 script_require_keys("MacOSX/QuickTime/Version");
 exit(0);
}

#

ver = get_kb_item("MacOSX/QuickTime/Version");
if ( ! ver ) exit(0);

version = split(ver, sep:'.', keep:FALSE);
if ( int(version[0]) == 7 && int(version[1]) == 0 && int(version[2]) == 0 ) 
  security_warning(0);
VendorProductVersionCPE
applequicktimecpe:/a:apple:quicktime

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

78.5%

Related for MACOSX_QUICKTIME701.NASL