Vulnerability Details : CVE-2010-1818
Public exploit exists!
The IPersistPropertyBag2::Read function in QTPlugin.ocx in Apple QuickTime 6.x, 7.x before 7.6.8, and other versions allows remote attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshalling of an untrusted pointer.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2010-1818
Probability of exploitation activity in the next 30 days: 96.97%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2010-1818
-
Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution
Disclosure Date: 2010-08-30First seen: 2020-04-26exploit/windows/browser/apple_quicktime_marshaled_punkThis module exploits a memory trust issue in Apple QuickTime 7.6.7. When processing a specially-crafted HTML page, the QuickTime ActiveX control will treat a supplied parameter as a trusted pointer. It will then use it as a COM-type pUnknown and lead to arbitrary c
CVSS scores for CVE-2010-1818
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2010-1818
-
The product accesses or uses a pointer that has not been initialized.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-1818
-
http://lists.apple.com/archives/security-announce/2010/Sep/msg00003.html
Apple - Lists.apple.comVendor Advisory
-
http://threatpost.com/en_us/blogs/new-remote-flaw-apple-quicktime-bypasses-aslr-and-dep-083010
Threatpost | The first stop for security newsBroken Link;Not Applicable
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7523
Repository / Oval Repository
-
http://support.apple.com/kb/ht4339
About the security content of QuickTime 7.6.8 - Apple SupportVendor Advisory
-
http://reversemode.com/index.php?option=com_content&task=view&id=69&Itemid=1
401 UnauthorizedExploit;Permissions Required
-
https://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb
Metasploit | Penetration Testing Software, Pen Testing Security | MetasploitBroken Link;Not Applicable
Products affected by CVE-2010-1818
- cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*