A vulnerability allows attackers to execute arbitrary code on systems with vulnerable installations of Apple's QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
ba713c314baf1496080cf8a7f18d2fc09ea9f48434abc1007d75e1a4358968f5