1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Apple Quicktime QTPlugin ActiveX BO

HTTP Apple Quicktime QTPlugin ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempts to exploit a buffer-overflow vulnerability in Apple Quicktime which could result in remote-code execution.

Additional Information

Apple QuickTime 'QTPlugin.ocx' ActiveX control is prone to multiple buffer-overflow vulnerabilities because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.

An attacker may exploit these issues to execute arbitrary code within the context of application that invoked the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.


  • These issues affect QuickTime 7.4.1 and prior versions.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube