The CallComponentFunctionWithStorage function in Apple QuickTime before 7.5.5 does not properly handle a large entry in the sample_size_table in STSZ atoms, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16152
http://www.zerodayinitiative.com/advisories/ZDI-08-059/
http://www.vupen.com/english/advisories/2008/2735
http://www.vupen.com/english/advisories/2008/2527
http://www.securityfocus.com/bid/31546
http://www.securityfocus.com/bid/31086
http://support.apple.com/kb/HT3189
http://support.apple.com/kb/HT3027
http://securitytracker.com/id?1020841
http://secunia.com/advisories/32121
http://secunia.com/advisories/31821
http://marc.info/?l=bugtraq&m=122099929821288&w=2
http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html
http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html