CVE-2007-5045
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
24/09/2007
Last modified:
09/04/2025
Description
Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox "-chrome" argument. NOTE: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:* | 7.1.5 (including) | |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 2.0.0.6 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://secunia.com/advisories/26881
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
- http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox
- http://www.mozilla.org/security/announce/2007/mfsa2007-28.html
- http://www.novell.com/linux/security/advisories/2007_57_mozilla.html
- http://www.securityfocus.com/archive/1/479179/100/0/threaded
- http://www.vupen.com/english/advisories/2007/3197
- https://bugzilla.mozilla.org/show_bug.cgi?id=395942
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5896
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://secunia.com/advisories/26881
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
- http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox
- http://www.mozilla.org/security/announce/2007/mfsa2007-28.html
- http://www.novell.com/linux/security/advisories/2007_57_mozilla.html
- http://www.securityfocus.com/archive/1/479179/100/0/threaded
- http://www.vupen.com/english/advisories/2007/3197
- https://bugzilla.mozilla.org/show_bug.cgi?id=395942
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5896



