语言:
https://www.zerodayinitiative.com/advisories/ZDI-13-080/
https://www.zerodayinitiative.com/advisories/ZDI-13-110/
http://www.zerodayinitiative.com/advisories/ZDI-13-111/
https://www.zerodayinitiative.com/advisories/ZDI-13-112/
https://www.zerodayinitiative.com/advisories/ZDI-13-113/
https://www.zerodayinitiative.com/advisories/ZDI-13-114/
https://www.zerodayinitiative.com/advisories/ZDI-13-115/
https://www.zerodayinitiative.com/advisories/ZDI-13-116/
https://www.zerodayinitiative.com/advisories/ZDI-13-117/
https://www.zerodayinitiative.com/advisories/ZDI-13-118/
http://www.zerodayinitiative.com/advisories/ZDI-13-119/
https://support.apple.com/en-us/HT202735
https://lists.apple.com/archives/security-announce/2013/May/msg00001.html
https://www.securityfocus.com/archive/1/526669/30/0/threaded
严重性: High
ID: 66636
文件名: quicktime_774.nasl
版本: 1.11
类型: local
代理: windows
系列: Windows
发布时间: 2013/5/28
最近更新时间: 2018/11/15
支持的传感器: Nessus Agent, Nessus
风险因素: High
分数: 7.4
风险因素: High
基本分数: 9.3
时间分数: 7.7
矢量: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:apple:quicktime
必需的 KB 项: SMB/QuickTime/Version
可利用: true
易利用性: Exploits are available
补丁发布日期: 2013/5/22
漏洞发布日期: 2013/5/22
Core Impact
Metasploit (Apple Quicktime 7 Invalid Atom Length Buffer Overflow)
CVE: CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-1015, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1020, CVE-2013-1021, CVE-2013-1022
BID: 60092, 60097, 60098, 60099, 60100, 60101, 60102, 60103, 60104, 60108, 60109, 60110
APPLE-SA: APPLE-SA-2013-05-22-1