This Metasploit module exploits a vulnerability found in Apple QuickTime.
>> CATEGORY: Apple
This Metasploit module exploits a vulnerability found in Apple QuickTime.
Apple QuickTime 7.7.2 TeXML Style Element font-table Field Stack Buffer Overflow
Passwords are safe. Hackers have nefarious motives
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
Apple QuickTime versions 7.7.2 and below suffer from a buffer overflow vulnerability in the handling of TGA files.
Apple QuickTime 7.7.2 Targa image Buffer Overflow
Zero Day Initiative Advisory 12-185 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OSX. Authentication is not required to exploit this vulnerability.
Java Applet JAX-WS Remote Code Execution
Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user’s system.
Apple Security Advisory 2012-11-07-1 – QuickTime version 7.7.3 is now available and addresses multiple buffer overflows, memory corruption, and use after free vulnerabilities.