Rapid7 Vulnerability & Exploit Database

QuickTime: QTJava objects can be unserialized by untrused java applets, allow arbitrary code execution (CVE-2008-1013)

Back to Search

QuickTime: QTJava objects can be unserialized by untrused java applets, allow arbitrary code execution (CVE-2008-1013)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
04/04/2008
Created
07/25/2018
Added
10/25/2010
Modified
02/13/2015

Description

An implementation issue in QuickTime for Java allows untrusted Java applets to deserialize objects provided by QTJava. Visiting a web page containing a maliciously crafted Java applet could allow the disclosure of sensitive information, or arbitrary code execution with the privileges of the current user. This update addresses the issue by disabling the ability of untrusted Java applets to deserialize QTJava objects. Credit to Adam Gowdiak for reporting this issue.

Solution(s)

  • quicktime-upgrade-7_4_5

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;