US-CERT Technical Cyber Security Alert TA07-005A -- Apple QuickTime RTSP Buffer Overflow

Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA07-005A

Apple QuickTime RTSP Buffer Overflow

Original release date: January 05, 2007
Last revised: --
Source: US-CERT

Systems Affected

Apple QuickTime on systems running

* Apple Mac OS X

* Microsoft Windows

Note that Apple iTunes and other software using the vulnerable
QuickTime components are also affected.


Apple QuickTime contains a buffer overflow in the handling of RTSP
URLs. This can allow a remote attacker to execute arbitrary code on a
vulnerable system.

I. Description

A vulnerability exists in the way Apple QuickTime handles specially
crafted Real Time Streaming Protocol (RTSP) URL strings. Public
exploit code is available that demonstrates how opening a .QTL file
triggers the buffer overflow. However, we have confirmed that other
attack vectors for the vulnerability also exist.

Possible attack vectors include

* a web page that uses the QuickTime plug-in or ActiveX control

* a web page that uses the rtsp:// protocol

* a file that is associated with the QuickTime Player

US-CERT is tracking this issue as VU#442497. This reference number
corresponds to CVE-2007-0015.

Note that this vulnerability affects QuickTime on Microsoft Windows
and Apple Mac platforms. Although web pages can be used as attack
vectors, this vulnerability is not dependent on the specific web
browser that is used.

II. Impact

By convincing a user to open specially crafted QuickTime content, a
remote, unauthenticated attacker can execute arbitrary code on a
vulnerable system.

III. Solution

We are currently unaware of a solution to this problem. Until a
solution becomes available, the workarounds provided in US-CERT
Vulnerability Note VU#442497 are strongly encouraged.


IV. References

* US-CERT Vulnerability Note VU#442497 -

* Securing Your Web Browser -

* CVE-2007-0015 -


The most recent version of this document can be found at:


Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@xxxxxxxx> with "TA07-005A Feedback VU#442497" in the

For instructions on subscribing to or unsubscribing from this
mailing list, visit <>.

Produced 2007 by US-CERT, a government organization.

Terms of use:


Revision History

January 05, 2007: Initial release

Version: GnuPG v1.2.1 (GNU/Linux)


Relevant Pages