Executive Summary

Summary
Title Apple QuickTime for Java may allow Java applets to gain elevated privileges
Informations
Name VU#319771 First vendor Publication 2007-11-08
Vendor VU-CERT Last vendor Modification 2007-11-08
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#319771

Apple QuickTime for Java may allow Java applets to gain elevated privileges

Overview

Apple QuickTime for Java contains a vulnerability that may allow a malicious Java applet to gain elevated privileges.

I. Description

Apple QuickTime is a media player that includes a browser plugin. QuickTime for Java provides APIs which allow Java developers to include multimedia in Java applets.

From Apple Article ID: 306896"About the security content of QuickTime 7.3":

    Multiple vulnerabilities exist in QuickTime for Java, which may allow untrusted Java applets to obtain elevated privileges. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker may cause the disclosure of sensitive information and arbitrary code execution with elevated privileges. This update addresses the issues by making QuickTime for Java no longer accessible to untrusted Java applets. Credit to Adam Gowdiak for reporting this issue.

To exploit this vulnerability, an attacker would have to convince a user to open a specially crafted Java applet which could be hosted on a webpage.

II. Impact

A remote, unauthenticated attacker may be able to take any action that the user running QuickTime can.

III. Solution

Upgrade

Apple has addressed this issue in QuickTime 7.3.

Disable Java
Until updates can be applied, disabling the Java plugin may mitigate this vulnerability. For instructions on how to disable Java in your browser, see Securing Your Web Browser.

Systems Affected

No Information Available

References


http://docs.info.apple.com/article.html?artnum=306896
http://developer.apple.com/quicktime/qtjava/
http://www.us-cert.gov/reading_room/securing_browser/

Credit

Apple credits Adam Gowdiak for reporting this issue

This document was written by Ryan Giobbi.

Other Information

Date Public11/05/2007
Date First Published11/08/2007 11:23:34 AM
Date Last Updated11/08/2007
CERT Advisory 
CVE NameCVE-2007-3751
Metric7.53
Document Revision4

Original Source

Url : http://www.kb.cert.org/vuls/id/319771

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 179
Os 3
Os 1
Os 1

Open Source Vulnerability Database (OSVDB)

Id Description
38548 Apple QuickTime for Java Unspecified Applet Privilege Escalation

Nessus® Vulnerability Scanner

Date Description
2007-11-06 Name : The remote Mac OS X host contains an application that is affected by multiple...
File : macosx_Quicktime73.nasl - Type : ACT_GATHER_INFO
2007-11-06 Name : The remote Windows host contains an application that is affected by multiple ...
File : quicktime_73.nasl - Type : ACT_GATHER_INFO