First published: Wed Sep 10 2008(Updated: )
Apple QuickTime before 7.5.5 does not properly handle (1) MDAT atoms in MP4 video files within QuickTimeH264.qtx, (2) MDAT atoms in mov video files within QuickTimeH264.scalar, and (3) AVC1 atoms in an unknown media type within an unspecified component, which allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via a crafted, H.264 encoded movie file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple QuickTime | <7.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3627 is rated as having a critical severity level due to the potential for remote code execution.
To fix CVE-2008-3627, update Apple QuickTime to version 7.5.5 or later.
CVE-2008-3627 affects Apple QuickTime versions earlier than 7.5.5.
CVE-2008-3627 is a remote code execution vulnerability related to improper handling of MP4 and MOV video files.
Yes, CVE-2008-3627 can be exploited remotely, allowing attackers to execute arbitrary code.