漏洞信息详情
Apple QuickTime for Windows qtnext字段自变量注入漏洞
漏洞简介
Windows XP SP2和Vista中的Apple QuickTime 7.2存在自变量注入漏洞,远程攻击者可以借助一个特制的QTL文件中的qtnext字段的一个URL执行任意指令。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
Apple Quicktime 7.2
Apple Security Update for QuickTime 7.2 for Windows
http://www.apple.com/support/downloads/securityupdateforquicktime72for
windows.html
Apple QuickTime Player 7.2
Apple Security Update for QuickTime 7.2 for Windows
http://www.apple.com/support/downloads/securityupdateforquicktime72for
windows.html
参考网址
来源: BID
名称: 25913
链接:http://www.securityfocus.com/bid/25913
来源: OSVDB
名称: 40434
链接:http://osvdb.org/40434
来源: APPLE
名称: APPLE-SA-2007-10-03
链接:http://lists.apple.com/archives/Security-announce/2007/Oct/msg00000.html
来源: docs.info.apple.com
链接:http://docs.info.apple.com/article.html?artnum=306560
来源: XF
名称: quicktime-qtl-code-execution(36937)
链接:http://xforce.iss.net/xforce/xfdb/36937
受影响实体
- Apple Quicktime:7.2:Windows_vista<!--2000-1-1-->
- Apple Quicktime:7.2:Windows_sp_2<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...