製品・ソフトウェアに関する情報
Apple QuickTime の IPersistPropertyBag2::Read における任意のコードを実行される脆弱性
Title Apple QuickTime の IPersistPropertyBag2::Read における任意のコードを実行される脆弱性
Summary

Apple QuickTime の QTPlugin.ocx 内にある IPersistPropertyBag2::Read には、任意のコードを実行される脆弱性が存在します。

Possible impacts 第三者により、_Marshaled_pUnk 属性を介して、任意のコードが実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Aug. 31, 2010, midnight
Registration Date Oct. 6, 2010, 4:57 p.m.
Last Update Oct. 6, 2010, 4:57 p.m.
CVSS2.0 : 危険
Score 9.3
Vector AV:N/AC:M/Au:N/C:C/I:C/A:C
Affected System
アップル
QuickTime 7.6.8 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2010年10月06日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2010-1818
Summary

The IPersistPropertyBag2::Read function in QTPlugin.ocx in Apple QuickTime 6.x, 7.x before 7.6.8, and other versions allows remote attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshalling of an untrusted pointer.

Publication Date Sept. 1, 2010, 5 a.m.
Registration Date Jan. 29, 2021, 11:01 a.m.
Last Update Nov. 21, 2024, 10:15 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List