Vulnerability Details : CVE-2007-0714
Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2007-0714
- cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-0714
86.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-0714
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-0714
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-0714
-
http://www.zerodayinitiative.com/advisories/ZDI-07-010.html
Vendor Advisory
-
http://www.securityfocus.com/bid/22827
-
http://www.vupen.com/english/advisories/2007/0825
Vendor Advisory
-
http://www.securitytracker.com/id?1017725
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32819
-
http://www.securityfocus.com/bid/22844
-
http://www.securityfocus.com/archive/1/461999/100/0/threaded
-
http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html
Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA07-065A.html
Patch;US Government Resource
-
http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html
-
http://docs.info.apple.com/article.html?artnum=305149
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/861817
US Government Resource
-
http://www.securityfocus.com/archive/1/462153/100/0/threaded
-
http://secway.org/advisory/AD20070306.txt
Jump to