This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability in Apple QuickTime.
Apple QuickTime is a media player that supports multiple file formats.
The application is prone to a heap-based buffer-overflow issue because it fails to perform adequate boundary checks on user-supplied data. Specifically, this issue occurs when parsing Sample Table Sample Descriptor atoms in a movie file.
An attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted movie file.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.
- Apple QuickTime Player 7.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.1, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.2, 7.3