Apple.QuickTime.H.263.PictureHeader.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a code-execution vulnerability in Apple QuickTime.
The vulnerability results from insecure code in the DLL responsible for parsing QuickTime media file. It can be exploited via a crafted ".3g2" file with malformed H.263 sample data, leading to remote code execution.

affected-products-logoAffected Products

QuickTime in Apple Mac OS X before 10.6.3

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's web site for the suggested workaround:
http://support.apple.com/kb/HT4077

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-01-11 16.995