Check Point Reference: | CPAI-2012-370 |
Date Published: | 14 Oct 2012 |
Severity: | High |
Last Updated: | Wednesday 04 December, 2024 |
Source: | CVE-2012-0663 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Apple Computer QuickTime prior to 7.7.2 |
Vulnerability Description | A stack buffer overflow vulnerability has been reported in Apple QuickTime. |
Vulnerability Details | The vulnerability is due to insufficient validation of a string length. A remote attacker can exploit this issue by enticing a user to open a specially crafted TeXML file. Successful exploitation would allow an attacker to execute arbitrary code in the security context of QuickTime player. |
This protection will detect and block malicious TeXML files.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Apple QuickTime Protection Violation
Attack Information: Apple QuickTime TeXML Transform Attribute Parsing Buffer Overflow