Lucene search

K
saintSAINT CorporationSAINT:22121186B3D05C0E4BC9D55E03F81042
HistorySep 20, 2010 - 12:00 a.m.

Apple QuickTime QTPlugin.ocx _Marshaled_pUnk Code Execution

2010-09-2000:00:00
SAINT Corporation
www.saintcorporation.com
12

0.971 High

EPSS

Percentile

99.8%

Added: 09/20/2010
CVE: CVE-2010-1818
BID: 42841
OSVDB: 67705

Background

Apple QuickTime is a media player for Windows and Mac OS platforms.

Problem

An input validation error in Apple QuickTime 7.6.7 and earlier versions allows remote attackers to execute arbitrary code by enticing the user to open a specially crafted web page. The vulnerability is exploited by passing an invalid value via the _Marshaled_pUnk parameter which is used as a valid pointer by the IPersistPropertyBag2::Read function in the QTPlugin.ocx ActiveX control.

Resolution

Upgrade to Apple QuickTime Player 7.6.8 or higher.

References

<http://www.zerodayinitiative.com/advisories/ZDI-10-168/&gt;

Limitations

Exploit works on Apple Quicktime 7.6.7.

The user must open the exploit page using Internet Explorer 6 or 7.

Platforms

Windows

0.971 High

EPSS

Percentile

99.8%