CVE-2007-0059

Current Description

Cross-zone scripting vulnerability in Apple Quicktime 3 to 7.1.3 allows remote user-assisted attackers to execute arbitrary code and list filesystem contents via a QuickTime movie (.MOV) with an HREF Track (HREFTrack) that contains an automatic action tag with a local URI, which is executed in a local zone during preview, as exploited by a MySpace worm.

Basic Data

PublishedJanuary 05, 2007
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegetrue
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAppleQuicktime3.0*******
    2.3ApplicationAppleQuicktime********7.1.3

Vulnerable Software List

VendorProductVersions
Apple Quicktime *, 3.0

References

NameSourceURLTags
http://docs.info.apple.com/article.html?artnum=305149http://docs.info.apple.com/article.html?artnum=305149CONFIRM
APPLE-SA-2007-03-05http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.htmlAPPLE
31164http://osvdb.org/31164OSVDB
http://projects.info-pull.com/moab/MOAB-03-01-2007.htmlhttp://projects.info-pull.com/moab/MOAB-03-01-2007.htmlMISCExploit
http://www.gnucitizen.org/blog/backdooring-quicktime-movies/http://www.gnucitizen.org/blog/backdooring-quicktime-movies/MISCVendor Advisory
VU#304064http://www.kb.cert.org/vuls/id/304064CERT-VNUS Government Resource