This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a vulnerability in Apple QuickTime that allows an attacker to execute arbitrary code.
Apple QuickTime is prone to a remote buffer-overflow vulnerability. This issue is due to a failure of the application to properly bounds-check user-supplied input prior to copying it to an insufficiently sized stack-based memory buffer.
Specifically, URIs with the 'RTSP' scheme containing specifically formatted excessive data will result in a memory buffer being overrun with attacker-supplied data.n n This issue allows remote attackers to execute arbitrary machine code in the context of the affected application, facilitating the remote compromise of affected computers.
QuickTime version 7.1.3 is vulnerable to this issue; other versions may also be affected.
- Apple QuickTime Player 7.1.3
Update to the latest version of Quicktime and ensure that all patches are applied.