Apple Quicktime RTSP buffer overflow vulnerability

Details are emerging about a critical exploit vulnerability in Apple's Quicktime product. An unpatched flaw in the RTSP (real-time streaming protocol) may allow remote attackers to compromise a system.

The vulnerability relates to how Quicktime handles RTSP replies, and can be exploited by sending an RTSP reply containing a RTSP "Content-Type" header which is too long for the buffer, which causes an overflow.

Attackers may be able to leverage this vulnerability in order to execute arbitrary code on the victim's system. Successful exploitation of this vulnerability requires the user to be tricked into opening a maliciously crafted file or visiting a malicious website or link.

This vulnerability affects version 7.3, but other versions may also be vulnerable. Exploit code is publicly available, and malicious websites hosting this exploit have been observed.

Users are very strongly advised to not open any untrusted quicktime streams, either from files in attachments, links or on untrusted websites.

More information can be found below.

US-CERT Note VU#659761

CVE reference for this vulnerability is CVE-2007-6166:

Secunia's page:

SANS ISC handler's page:

Posted by William Harshbarger on December 03, 2007, in Handlers Log.

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2016 Purdue University | An equal access/equal opportunity university | Integrity Statement | Copyright Complaints | Maintained by ITaP

Trouble with this page? Disability-related accessibility issue? Please contact ITaP at

PDF files can be viewed in Adobe Acrobat Reader.