Apple QuickTime RTSP Response Header Content-Type Remote Stack Based Buffer Overflow Vulnerability

UPDATE: Further investigation indicates that this issue is being exploited in the wild.

UPDATE (December 4, 2007): Attackers are exploiting this issue through the Second Life Viewer to steal Linden dollars from unsuspecting victims.

To exploit this issue, an attacker must entice an unsuspecting user to connect to a malicious RTSP server.

Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.

The following exploit code is available:


 

Privacy Statement
Copyright 2010, SecurityFocus