Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2007-0714
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 9.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:* |
No
|
- |
References
- http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html
- http://docs.info.apple.com/article.html?artnum=305149
- http://secway.org/advisory/AD20070306.txt
- http://www.zerodayinitiative.com/advisories/ZDI-07-010.html
- http://www.us-cert.gov/cas/techalerts/TA07-065A.html
- http://www.kb.cert.org/vuls/id/861817
- http://www.securityfocus.com/bid/22827
- http://www.securityfocus.com/bid/22844
- http://www.securitytracker.com/id?1017725
- http://secunia.com/advisories/24359
- http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html
- http://osvdb.org/33902
- http://www.vupen.com/english/advisories/2007/0825
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32819
- http://www.securityfocus.com/archive/1/462153/100/0/threaded
- http://www.securityfocus.com/archive/1/461999/100/0/threaded