var-200703-0017
Vulnerability from variot
Stack-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QTIF file. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues. These issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions. Few details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available. QuickTime versions prior to 7.1.5 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There are multiple buffer overflow vulnerabilities in QuickTime's processing of various media formats. Remote attackers may exploit these vulnerabilities to control the user's machine by enticing the user to open and process malformed media files. There is a stack overflow when QuickTime handles QTIF files. (CVE-2007-0716)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0017", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 6.4, "vendor": "apple computer", "version": null }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.1.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.1.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.1.4" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.1.3" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0" }, { "model": "quicktime", "scope": "lte", "trust": 0.8, "vendor": "apple", "version": "7.1.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6" }, { "model": "quicktime player", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.1.5" } ], "sources": [ { "db": "CERT/CC", "id": "VU#568689" }, { "db": "CERT/CC", "id": "VU#880561" }, { "db": "CERT/CC", "id": "VU#822481" }, { "db": "CERT/CC", "id": "VU#861817" }, { "db": "CERT/CC", "id": "VU#448745" }, { "db": "CERT/CC", "id": "VU#313225" }, { "db": "CERT/CC", "id": "VU#410993" }, { "db": "CERT/CC", "id": "VU#642433" }, { "db": "BID", "id": "22827" }, { "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "db": "CNNVD", "id": "CNNVD-200703-176" }, { "db": "NVD", "id": "CVE-2007-0716" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:quicktime", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000196" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "JJ Reyes\nMike Price\niotr Bania\nArtur Ogloza\nPiotr Bania\u203b bania.piotr@gmail.com\u203bSowhat\u203b smaillist@gmail.com\u203bhttp://www.zerodayinitiative.com/", "sources": [ { "db": "CNNVD", "id": "CNNVD-200703-176" } ], "trust": 0.6 }, "cve": "CVE-2007-0716", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2007-0716", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-24078", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-0716", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#568689", "trust": 0.8, "value": "16.20" }, { "author": "CARNEGIE MELLON", "id": "VU#880561", "trust": 0.8, "value": "6.64" }, { "author": "CARNEGIE MELLON", "id": "VU#822481", "trust": 0.8, "value": "9.00" }, { "author": "CARNEGIE MELLON", "id": "VU#861817", "trust": 0.8, "value": "17.36" }, { "author": "CARNEGIE MELLON", "id": "VU#448745", "trust": 0.8, "value": "4.81" }, { "author": "CARNEGIE MELLON", "id": "VU#313225", "trust": 0.8, "value": "17.72" }, { "author": "CARNEGIE MELLON", "id": "VU#410993", "trust": 0.8, "value": "16.20" }, { "author": "CARNEGIE MELLON", "id": "VU#642433", "trust": 0.8, "value": "16.20" }, { "author": "NVD", "id": "CVE-2007-0716", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200703-176", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-24078", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#568689" }, { "db": "CERT/CC", "id": "VU#880561" }, { "db": "CERT/CC", "id": "VU#822481" }, { "db": "CERT/CC", "id": "VU#861817" }, { "db": "CERT/CC", "id": "VU#448745" }, { "db": "CERT/CC", "id": "VU#313225" }, { "db": "CERT/CC", "id": "VU#410993" }, { "db": "CERT/CC", "id": "VU#642433" }, { "db": "VULHUB", "id": "VHN-24078" }, { "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "db": "CNNVD", "id": "CNNVD-200703-176" }, { "db": "NVD", "id": "CVE-2007-0716" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QTIF file. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues. \nThese issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions. \nFew details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available. \nQuickTime versions prior to 7.1.5 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There are multiple buffer overflow vulnerabilities in QuickTime\u0027s processing of various media formats. Remote attackers may exploit these vulnerabilities to control the user\u0027s machine by enticing the user to open and process malformed media files. There is a stack overflow when QuickTime handles QTIF files. (CVE-2007-0716)", "sources": [ { "db": "NVD", "id": "CVE-2007-0716" }, { "db": "CERT/CC", "id": "VU#568689" }, { "db": "CERT/CC", "id": "VU#880561" }, { "db": "CERT/CC", "id": "VU#822481" }, { "db": "CERT/CC", "id": "VU#861817" }, { "db": "CERT/CC", "id": "VU#448745" }, { "db": "CERT/CC", "id": "VU#313225" }, { "db": "CERT/CC", "id": "VU#410993" }, { "db": "CERT/CC", "id": "VU#642433" }, { "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "db": "BID", "id": "22827" }, { "db": "VULHUB", "id": "VHN-24078" } ], "trust": 7.74 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "22827", "trust": 9.2 }, { "db": "SECUNIA", "id": "24359", "trust": 8.9 }, { "db": "SECTRACK", "id": "1017725", "trust": 8.1 }, { "db": "AUSCERT", "id": "AL-2007.0031", "trust": 6.4 }, { "db": "CERT/CC", "id": "VU#642433", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2007-0716", "trust": 2.8 }, { "db": "USCERT", "id": "TA07-065A", "trust": 2.8 }, { "db": "OSVDB", "id": "33900", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-0825", "trust": 1.7 }, { "db": "XF", "id": "32822", "trust": 1.4 }, { "db": "CERT/CC", "id": "VU#568689", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#880561", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#822481", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#861817", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#448745", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#313225", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#410993", "trust": 1.1 }, { "db": "BID", "id": "22843", "trust": 0.8 }, { "db": "BID", "id": "22844", "trust": 0.8 }, { "db": "ZDI", "id": "ZDI-07-010", "trust": 0.8 }, { "db": "USCERT", "id": "SA07-065A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2007-000196", "trust": 0.8 }, { "db": "CERT/CC", "id": "TA07-065A", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2007-03-05", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200703-176", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-24078", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#568689" }, { "db": "CERT/CC", "id": "VU#880561" }, { "db": "CERT/CC", "id": "VU#822481" }, { "db": "CERT/CC", "id": "VU#861817" }, { "db": "CERT/CC", "id": "VU#448745" }, { "db": "CERT/CC", "id": "VU#313225" }, { "db": "CERT/CC", "id": "VU#410993" }, { "db": "CERT/CC", "id": "VU#642433" }, { "db": "VULHUB", "id": "VHN-24078" }, { "db": "BID", "id": "22827" }, { "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "db": "CNNVD", "id": "CNNVD-200703-176" }, { "db": "NVD", "id": "CVE-2007-0716" } ] }, "id": "VAR-200703-0017", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-24078" } ], "trust": 0.01 }, "last_update_date": "2024-09-19T22:29:36.590000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "QuickTime 7.1.5 for Mac", "trust": 0.8, "url": "http://www.apple.com/support/downloads/quicktime715formac.html" }, { "title": "QuickTime 7.1.5 for Windows", "trust": 0.8, "url": "http://www.apple.com/support/downloads/quicktime715forwindows.html" }, { "title": "QuickTime 7.1.5", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305149" }, { "title": "QuickTime 7.1.5", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305149-ja" }, { "title": "\u30a2\u30c3\u30d7\u30eb - QuickTime", "trust": 0.8, "url": "http://www.apple.com/jp/quicktime/download/win.html" }, { "title": "QuickTime 7.1.5 for Windows", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/quicktime715forwindows.html" }, { "title": "QuickTime 7.1.5 for Mac", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/quicktime715formac.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000196" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-0716" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 8.9, "url": "http://www.securityfocus.com/bid/22827" }, { "trust": 8.1, "url": "http://docs.info.apple.com/article.html?artnum=305149" }, { "trust": 6.4, "url": "http://secunia.com/advisories/24359/" }, { "trust": 6.4, "url": "http://www.auscert.org.au/7356" }, { "trust": 6.4, "url": "http://www.ciac.org/ciac/bulletins/r-171.shtml " }, { "trust": 5.6, "url": "http://securitytracker.com/id?1017725 " }, { "trust": 2.8, "url": "http://www.us-cert.gov/cas/techalerts/ta07-065a.html" }, { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/642433" }, { "trust": 2.7, "url": "http://www.apple.com/quicktime/download/" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1017725" }, { "trust": 2.5, "url": "http://secunia.com/advisories/24359" }, { "trust": 2.4, "url": "http://www.us-cert.gov/cas/tips/st04-010.html" }, { "trust": 2.4, "url": "http://support.microsoft.com/default.aspx?scid=kb;en-us;q294676" }, { "trust": 2.4, "url": "http://www.cert.org/tech_tips/before_you_plug_in.html" }, { "trust": 2.4, "url": "http://www.mozilla.org/support/firefox/faq" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2007/mar/msg00000.html" }, { "trust": 1.7, "url": "http://osvdb.org/33900" }, { "trust": 1.6, "url": "http://www.apple.com/itunes/" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/0825" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/32822" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/0825" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32822" }, { "trust": 0.8, "url": "http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt" }, { "trust": 0.8, "url": "http://en.wikipedia.org/wiki/.mov" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/22843" }, { "trust": 0.8, "url": "http://en.wikipedia.org/wiki/musical_instrument_digital_interface" }, { "trust": 0.8, "url": "http://developer.apple.com/documentation/quicktime/qtff/index.html" }, { "trust": 0.8, "url": "http://developer.apple.com/documentation/quicktime/qtff/qtffchap2/chapter_3_section_2.html" }, { "trust": 0.8, "url": "http://secway.org/advisory/ad20070306.txt" }, { "trust": 0.8, "url": "http://secway.org/advisory/ad20060512.txt" }, { "trust": 0.8, "url": "http://www.zerodayinitiative.com/advisories/zdi-07-010.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/22844" }, { "trust": 0.8, "url": "http://en.wikipedia.org/wiki/pict" }, { "trust": 0.8, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=486" }, { "trust": 0.8, "url": "http://www.reversemode.com/index.php?option=com_remository\u0026itemid=2\u0026func=fileinfo\u0026id=46" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0716" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta07-065a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta07-065a/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0716" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa07-065a.html" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/2007/20070306_153534.html" }, { "trust": 0.3, "url": "http://www.apple.com/quicktime/" }, { "trust": 0.3, "url": "msg://bugtraq/45ec9719.10206@idefense.com" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/313225" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/410993" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/448745" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/568689" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/822481" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/861817" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/880561" } ], "sources": [ { "db": "CERT/CC", "id": "VU#568689" }, { "db": "CERT/CC", "id": "VU#880561" }, { "db": "CERT/CC", "id": "VU#822481" }, { "db": "CERT/CC", "id": "VU#861817" }, { "db": "CERT/CC", "id": "VU#448745" }, { "db": "CERT/CC", "id": "VU#313225" }, { "db": "CERT/CC", "id": "VU#410993" }, { "db": "CERT/CC", "id": "VU#642433" }, { "db": "VULHUB", "id": "VHN-24078" }, { "db": "BID", "id": "22827" }, { "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "db": "CNNVD", "id": "CNNVD-200703-176" }, { "db": "NVD", "id": "CVE-2007-0716" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#568689" }, { "db": "CERT/CC", "id": "VU#880561" }, { "db": "CERT/CC", "id": "VU#822481" }, { "db": "CERT/CC", "id": "VU#861817" }, { "db": "CERT/CC", "id": "VU#448745" }, { "db": "CERT/CC", "id": "VU#313225" }, { "db": "CERT/CC", "id": "VU#410993" }, { "db": "CERT/CC", "id": "VU#642433" }, { "db": "VULHUB", "id": "VHN-24078" }, { "db": "BID", "id": "22827" }, { "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "db": "CNNVD", "id": "CNNVD-200703-176" }, { "db": "NVD", "id": "CVE-2007-0716" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#568689" }, { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#880561" }, { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#822481" }, { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#861817" }, { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#448745" }, { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#313225" }, { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#410993" }, { "date": "2007-03-06T00:00:00", "db": "CERT/CC", "id": "VU#642433" }, { "date": "2007-03-05T00:00:00", "db": "VULHUB", "id": "VHN-24078" }, { "date": "2007-03-05T00:00:00", "db": "BID", "id": "22827" }, { "date": "2007-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "date": "2007-03-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-176" }, { "date": "2007-03-05T22:19:00", "db": "NVD", "id": "CVE-2007-0716" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-19T00:00:00", "db": "CERT/CC", "id": "VU#568689" }, { "date": "2007-03-19T00:00:00", "db": "CERT/CC", "id": "VU#880561" }, { "date": "2007-03-19T00:00:00", "db": "CERT/CC", "id": "VU#822481" }, { "date": "2007-03-19T00:00:00", "db": "CERT/CC", "id": "VU#861817" }, { "date": "2007-03-09T00:00:00", "db": "CERT/CC", "id": "VU#448745" }, { "date": "2007-03-19T00:00:00", "db": "CERT/CC", "id": "VU#313225" }, { "date": "2007-03-19T00:00:00", "db": "CERT/CC", "id": "VU#410993" }, { "date": "2007-03-19T00:00:00", "db": "CERT/CC", "id": "VU#642433" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-24078" }, { "date": "2007-03-06T21:05:00", "db": "BID", "id": "22827" }, { "date": "2007-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000196" }, { "date": "2007-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-176" }, { "date": "2017-07-29T01:30:21.907000", "db": "NVD", "id": "CVE-2007-0716" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200703-176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple QuickTime 3GP integer overflow", "sources": [ { "db": "CERT/CC", "id": "VU#568689" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200703-176" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.