語系:
https://www.zerodayinitiative.com/advisories/ZDI-13-080/
https://www.zerodayinitiative.com/advisories/ZDI-13-110/
http://www.zerodayinitiative.com/advisories/ZDI-13-111/
https://www.zerodayinitiative.com/advisories/ZDI-13-112/
https://www.zerodayinitiative.com/advisories/ZDI-13-113/
https://www.zerodayinitiative.com/advisories/ZDI-13-114/
https://www.zerodayinitiative.com/advisories/ZDI-13-115/
https://www.zerodayinitiative.com/advisories/ZDI-13-116/
https://www.zerodayinitiative.com/advisories/ZDI-13-117/
https://www.zerodayinitiative.com/advisories/ZDI-13-118/
http://www.zerodayinitiative.com/advisories/ZDI-13-119/
https://support.apple.com/en-us/HT202735
https://lists.apple.com/archives/security-announce/2013/May/msg00001.html
https://www.securityfocus.com/archive/1/526669/30/0/threaded
嚴重性: High
ID: 66636
檔案名稱: quicktime_774.nasl
版本: 1.11
類型: local
代理程式: windows
系列: Windows
已發布: 2013/5/28
已更新: 2018/11/15
支援的感應器: Nessus Agent, Nessus
風險因素: High
分數: 7.4
風險因素: High
基本分數: 9.3
時間分數: 7.7
媒介: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:apple:quicktime
必要的 KB 項目: SMB/QuickTime/Version
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2013/5/22
弱點發布日期: 2013/5/22
Core Impact
Metasploit (Apple Quicktime 7 Invalid Atom Length Buffer Overflow)
CVE: CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-1015, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1020, CVE-2013-1021, CVE-2013-1022
BID: 60092, 60097, 60098, 60099, 60100, 60101, 60102, 60103, 60104, 60108, 60109, 60110
APPLE-SA: APPLE-SA-2013-05-22-1