CVE-2010-1818
Severity CVSS v4.0:
Pending analysis
Type:
CWE-824
Access of Uninitialized Pointer
Publication date:
31/08/2010
Last modified:
11/04/2025
Description
The IPersistPropertyBag2::Read function in QTPlugin.ocx in Apple QuickTime 6.x, 7.x before 7.6.8, and other versions allows remote attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshalling of an untrusted pointer.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2010/Sep/msg00003.html
- http://reversemode.com/index.php?option=com_content&task=view&id=69&Itemid=1
- http://support.apple.com/kb/ht4339
- http://threatpost.com/en_us/blogs/new-remote-flaw-apple-quicktime-bypasses-aslr-and-dep-083010
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7523
- https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb
- http://lists.apple.com/archives/security-announce/2010/Sep/msg00003.html
- http://reversemode.com/index.php?option=com_content&task=view&id=69&Itemid=1
- http://support.apple.com/kb/ht4339
- http://threatpost.com/en_us/blogs/new-remote-flaw-apple-quicktime-bypasses-aslr-and-dep-083010
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7523
- https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb



