http://www.nessus.org/u?ebb12673
http://projects.info-pull.com/moab/MOAB-01-01-2007.html
http://docs.info.apple.com/article.html?artnum=304989
https://lists.apple.com/archives/Security-announce/2007/Jan/msg00000.html
https://blogs.flexera.com/vulnerability-management/2007/01/quicktime-update-me-and-stay-vulnerable/
Severity: Medium
ID: 24268
File Name: quicktime_rtsp_url_handler_overflow.nasl
Version: 1.23
Type: local
Agent: windows
Family: Windows
Published: 2/2/2007
Updated: 11/15/2018
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 8.8
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE: cpe:/a:apple:quicktime
Required KB Items: SMB/QuickTime/Version
Exploit Available: true
Exploit Ease: Exploits are available
Vulnerability Publication Date: 1/1/2007
CANVAS (CANVAS)
Core Impact
Metasploit (Apple QuickTime 7.1.3 RTSP URI Buffer Overflow)
CVE: CVE-2007-0015
BID: 21829
CERT: 442497