Language:
https://www.zerodayinitiative.com/advisories/ZDI-13-110/
http://www.zerodayinitiative.com/advisories/ZDI-13-111/
https://www.zerodayinitiative.com/advisories/ZDI-13-112/
https://www.zerodayinitiative.com/advisories/ZDI-13-113/
https://www.zerodayinitiative.com/advisories/ZDI-13-114/
https://www.zerodayinitiative.com/advisories/ZDI-13-115/
https://www.zerodayinitiative.com/advisories/ZDI-13-116/
https://www.zerodayinitiative.com/advisories/ZDI-13-117/
https://www.zerodayinitiative.com/advisories/ZDI-13-118/
http://www.zerodayinitiative.com/advisories/ZDI-13-119/
https://support.apple.com/en-us/HT202735
https://lists.apple.com/archives/security-announce/2013/May/msg00001.html
https://www.securityfocus.com/archive/1/526669/30/0/threaded
深刻度: High
ID: 66636
ファイル名: quicktime_774.nasl
バージョン: 1.11
タイプ: local
エージェント: windows
ファミリー: Windows
公開日: 2013/5/28
更新日: 2018/11/15
サポートされているセンサー: Nessus Agent, Nessus
リスクファクター: High
スコア: 7.4
リスクファクター: High
Base Score: 9.3
Temporal Score: 7.7
ベクトル: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:apple:quicktime
必要な KB アイテム: SMB/QuickTime/Version
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2013/5/22
脆弱性公開日: 2013/5/22
Core Impact
Metasploit (Apple Quicktime 7 Invalid Atom Length Buffer Overflow)
CVE: CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-1015, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1020, CVE-2013-1021, CVE-2013-1022
BID: 60092, 60097, 60098, 60099, 60100, 60101, 60102, 60103, 60104, 60108, 60109, 60110
APPLE-SA: APPLE-SA-2013-05-22-1