Executive Summary

Title Apple QuickTime "file
NameVU#132419First vendor Publication2008-06-10
VendorVU-CERTLast vendor Modification2008-06-10
Severity (Vendor) N/ARevisionM

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#132419

Apple QuickTime "file: URL" arbitrary code execution


Apple QuickTime does not properly handle "file: URLs" which may allow an attacker to execute arbitrary code.

I. Description

Apple QuickTime is a multiplatform multimedia software architecture which provides file format converters for more than 250 common image, video, and audio file formats.

Per the Apple advisory About the security content of QuickTime 7.5:

    A URL handling issue exists in QuickTime's handling of file: URLs. This may allow arbitrary applications and files to be launched when a user plays maliciously crafted QuickTime content in QuickTime Player.

II. Impact

By convincing a user to play a maliciously crafted QuickTime file, an attacker may be able to execute arbitrary code on a vulnerable system.

III. Solution

Apple has addressed this vulnerability in QuickTime 7.5 release.

Systems Affected

VendorStatusDate Updated
Apple Computer, Inc.Vulnerable10-Jun-2008




Apple credits to Vinoo Thomas and Rahul Mohandas of McAfee Avert Labs, and Petko D. (pdp) Petkov of GNUCITIZEN working with TippingPoint's Zero Day Initiative for reporting this issue.

This document was written by Joseph Pruszynski.

Other Information

Date Public06/09/2008
Date First Published06/10/2008 03:23:13 PM
Date Last Updated06/10/2008
CERT Advisory
CVE NameCVE-2008-1585
US-CERT Technical Alerts
Document Revision8

Original Source

Url : http://www.kb.cert.org/vuls/id/132419

CWE : Common Weakness Enumeration

100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration


OpenVAS Exploits

2008-09-26Name : Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities (Win)
File : nvt/gb_apple_quicktime_mult_vuln_win.nasl

Open Source Vulnerability Database (OSVDB)

46073Apple QuickTime Embedded SMIL Text qt:next Attribute Arbitrary File Execution

Snort® IPS/IDS

2014-01-10Apple QuickTime SMIL qtnext redirect file execution attempt
RuleID : 15487 - Revision : 10 - Type : FILE-MULTIMEDIA

Nessus® Vulnerability Scanner

2008-06-10Name : The remote Windows host contains an application that is affected by multiple ...
File : quicktime_75.nasl - Type : ACT_GATHER_INFO
2008-06-10Name : The remote Mac OS X host contains an application that is affected by multiple...
File : macosx_Quicktime75.nasl - Type : ACT_GATHER_INFO