Apple QuickTime before 7.5 uses the url.dll!FileProtocolHandler handler for unrecognized URIs in qt:next attributes within SMIL text in video files, which sends these URIs to explorer.exe and thereby allows remote attackers to execute arbitrary programs, as originally demonstrated by crafted file: URLs.
https://exchange.xforce.ibmcloud.com/vulnerabilities/42948
http://www.zerodayinitiative.com/advisories/ZDI-08-038/
http://www.vupen.com/english/advisories/2008/2064/references
http://www.vupen.com/english/advisories/2008/1776/references
http://www.us-cert.gov/cas/techalerts/TA08-162C.html
http://www.securitytracker.com/id?1020217
http://www.securityfocus.com/bid/29650
http://www.securityfocus.com/bid/29619
http://www.securityfocus.com/archive/1/493248/100/0/threaded
http://www.kb.cert.org/vuls/id/132419
http://support.apple.com/kb/HT1991
http://secunia.com/advisories/31034
http://secunia.com/advisories/29293
http://lists.apple.com/archives/security-announce/2008/Jun/msg00000.html
http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html