CVE-2008-0234
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
11/01/2008
Last modified:
09/04/2025
Description
Buffer overflow in Apple Quicktime Player 7.3.1.70 and other versions before 7.4.1, when RTSP tunneling is enabled, allows remote attackers to execute arbitrary code via a long Reason-Phrase response to an rtsp:// request, as demonstrated using a 404 error message.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2008/Feb/msg00001.html
- http://secunia.com/advisories/28423
- http://secunia.com/advisories/31034
- http://securityreason.com/securityalert/3537
- http://www.kb.cert.org/vuls/id/112179
- http://www.securityfocus.com/archive/1/486091/100/0/threaded
- http://www.securityfocus.com/archive/1/486114/100/0/threaded
- http://www.securityfocus.com/archive/1/486161/100/0/threaded
- http://www.securityfocus.com/archive/1/486174/100/0/threaded
- http://www.securityfocus.com/archive/1/486238/100/0/threaded
- http://www.securityfocus.com/archive/1/486241/100/0/threaded
- http://www.securityfocus.com/archive/1/486268/100/0/threaded
- http://www.securityfocus.com/bid/27225
- http://www.securitytracker.com/id?1019178=
- http://www.vupen.com/english/advisories/2008/0107
- http://www.vupen.com/english/advisories/2008/2064/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39601
- https://www.exploit-db.com/exploits/4885
- https://www.exploit-db.com/exploits/4906
- http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2008/Feb/msg00001.html
- http://secunia.com/advisories/28423
- http://secunia.com/advisories/31034
- http://securityreason.com/securityalert/3537
- http://www.kb.cert.org/vuls/id/112179
- http://www.securityfocus.com/archive/1/486091/100/0/threaded
- http://www.securityfocus.com/archive/1/486114/100/0/threaded
- http://www.securityfocus.com/archive/1/486161/100/0/threaded
- http://www.securityfocus.com/archive/1/486174/100/0/threaded
- http://www.securityfocus.com/archive/1/486238/100/0/threaded
- http://www.securityfocus.com/archive/1/486241/100/0/threaded
- http://www.securityfocus.com/archive/1/486268/100/0/threaded
- http://www.securityfocus.com/bid/27225
- http://www.securitytracker.com/id?1019178=
- http://www.vupen.com/english/advisories/2008/0107
- http://www.vupen.com/english/advisories/2008/2064/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39601
- https://www.exploit-db.com/exploits/4885
- https://www.exploit-db.com/exploits/4906