First published: Sun Jul 15 2007(Updated: )
The design of QuickTime for Java in Apple Quicktime before 7.2 allows remote attackers to bypass certain security controls and write to process memory via Java applets, possibly leading to arbitrary code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple QuickTime | =7.0.3 | |
Apple QuickTime | =7.1.5 | |
Apple QuickTime | =7.0.1 | |
Apple QuickTime | =7.0 | |
Apple QuickTime | =7.0.2 | |
Apple QuickTime | =7.0.4 | |
Apple QuickTime | =7.1.2 | |
Apple QuickTime | =7.1 | |
Apple QuickTime | =7.1.1 | |
Apple QuickTime | =7.1.4 | |
Apple QuickTime | =7.1.3 | |
Apple QuickTime |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2393 is considered a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2007-2393, update Apple QuickTime to version 7.2 or later.
CVE-2007-2393 allows remote attackers to bypass security controls and write to process memory, potentially leading to arbitrary code execution.
CVE-2007-2393 affects several versions of Apple QuickTime prior to 7.2, including versions 7.0.1 to 7.1.5.
Yes, CVE-2007-2393 can be exploited through Java applets, allowing attackers to execute arbitrary code.