Trojan.Quimkit
Vulnerability details
Advisory: SB2007112401 - Remote code execution in Apple QuickTime
Vulnerable component: Apple QuickTime
CVE-ID: CVE-2007-6166
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-119 - Memory corruption
Description:
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when handling specially crafted overly long RTSP (Real Time Streaming Protocol) Response Content-Type header. A remote attacker can create a specially crafted web page, trick the victim into opening it, cause buffer overflow and execute arbitrary code on vulnerable system.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Public Exploits:
- Apple QuickTime (Mac OSX) - RTSP Content-Type Overflow (Metasploit) [Exploit-DB]
- Apple QuickTime 7.3 - RTSP Response Header Buffer Overflow (Metasploit) [Exploit-DB]
- Apple QuickTime 7.2/7.3 - RTSP Buffer Overflow (Perl) [Exploit-DB]
- Apple Safari / QuickTime 7.3 - RTSP Content-Type Remote Buffer Overflow [Exploit-DB]
- Apple QuickTime 7.2/7.3 - RSTP Response Universal Exploit [Exploit-DB]
- Apple QuickTime 7.2/7.3 (Internet Explorer 7 / Firefox / Opera) - RTSP Response Universal Exploit [Exploit-DB]
- Apple QuickTime 7.2/7.3 (Windows Vista / Windows XP) - RSTP Response Code Execution [Exploit-DB]
- Apple QuickTime 7.2/7.3 - RTSP Response Remote Overwrite (SEH) [Exploit-DB]
External links:
https://www.symantec.com/connect/blogs/zero-day-exploit-apple-quicktime-vulnerability
https://ch-fr.norton.com/security_response/writeup.jsp?docid=2007-112605-2410-99
https://www.virusbulletin.com/virusbulletin/2010/05/exploit-kit-explosion-part-two-vectors-attack/
https://www.virusbulletin.com/virusbulletin/2010/11/exploit-identification/
http://www.kb.cert.org/vuls/id/659761
https://www.symantec.com/connect/blogs/apple-quicktime-exploit-twist