A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists in the parsing of mov video files in QuickTimeH264.scalar. A maliciously crafted MDAT atom can cause a heap corruption resulting in the execution of arbitrary code under the context of the current user.
5505a8d86f01ec1cb84018259da835f194e151aac9cb3eaae01af2039ff9552a
Apple Mac OS X mount_smbf stack based buffer overflow exploit.
3b6c24e9c635497ed8020ede7812b2da10e9b4d8877d0ac90fc7701b326c05da
Apple Quicktime versions 7.2 and 7.3 RTSP response Content-Type header stack buffer overflow exploit for Mac-OSX and Microsoft Windows.
d154c6e12dd365a42668982a18f11a460123575bb7de81ca79d27b0ed0ca101e