Rapid7 Vulnerability & Exploit Database

QuickTime: security controls bypass allows arbitrary code execution via malicious Java applets (CVE-2007-2393)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

QuickTime: security controls bypass allows arbitrary code execution via malicious Java applets (CVE-2007-2393)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/15/2007
Created
07/25/2018
Added
10/25/2010
Modified
10/03/2016

Description

A design issue exists in QuickTime for Java. This may allow Java applets to bypass security checks in order to read and write process memory. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution. This update addresses the issue by performing additional validation of Java applets. Credit to Adam Gowdiak for reporting this issue.

Solution(s)

  • quicktime-upgrade-7_2_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;