CVE-2008-1585 Information

Share on:

Description

Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs as originally demonstrated by crafted file: URLs.

Reference

http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html http://lists.apple.com/archives/security-announce/2008/Jun/msg00000.html http://secunia.com/advisories/29293 http://secunia.com/advisories/31034 http://support.apple.com/kb/HT1991 http://www.kb.cert.org/vuls/id/132419 http://www.securityfocus.com/archive/1/493248/100/0/threaded http://www.securityfocus.com/bid/29619 http://www.securityfocus.com/bid/29650 http://www.securitytracker.com/id?1020217 http://www.us-cert.gov/cas/techalerts/TA08-162C.html http://www.vupen.com/english/advisories/2008/1776/references http://www.vupen.com/english/advisories/2008/2064/references http://www.zerodayinitiative.com/advisories/ZDI-08-038/ https://exchange.xforce.ibmcloud.com/vulnerabilities/42948 Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs as originally demonstrated by crafted file: URLs.