Rapid7 Vulnerability & Exploit Database

QuickTime: DLL hijacking allows arbitrary code execution (CVE-2010-1819)

Back to Search

QuickTime: DLL hijacking allows arbitrary code execution (CVE-2010-1819)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
10/25/2010
Created
07/25/2018
Added
10/25/2010
Modified
01/30/2020

Description

A path searching issue exists in QuickTime Picture Viewer. If an attacker places a maliciously crafted DLL in the same directory as an image file, opening the image file with QuickTime Picture Viewer may lead to arbitrary code execution. This issue is addressed by removing the current working directory from the DLL search path. This issue does not affect Mac OS X systems. Credit to Haifei Li of Fortinet's FortiGuard Labs for reporting this issue.

Solution(s)

  • quicktime-upgrade-7_6_8

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;