Language:
https://www.zerodayinitiative.com/advisories/ZDI-12-095/
http://www.zerodayinitiative.com/advisories/ZDI-12-103/
https://www.zerodayinitiative.com/advisories/ZDI-12-105/
https://www.zerodayinitiative.com/advisories/ZDI-12-107/
https://www.zerodayinitiative.com/advisories/ZDI-12-108/
https://www.zerodayinitiative.com/advisories/ZDI-12-109/
https://www.zerodayinitiative.com/advisories/ZDI-12-125/
http://www.zerodayinitiative.com/advisories/ZDI-12-130/
https://www.zerodayinitiative.com/advisories/ZDI-12-153/
https://www.securityfocus.com/archive/1/523524/30/0/threaded
https://support.apple.com/en-us/HT202472
https://lists.apple.com/archives/security-announce/2012/May/msg00005.html
https://www.zerodayinitiative.com/advisories/ZDI-12-075/
https://www.zerodayinitiative.com/advisories/ZDI-12-076/
Severity: High
ID: 59113
File Name: quicktime_772.nasl
Version: 1.26
Type: local
Agent: windows
Family: Windows
Published: 5/16/2012
Updated: 11/15/2018
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:apple:quicktime
Required KB Items: SMB/QuickTime/Version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/15/2012
Vulnerability Publication Date: 5/15/2012
Core Impact
Metasploit (Apple QuickTime TeXML Style Element Stack Buffer Overflow)
CVE: CVE-2011-3458, CVE-2011-3459, CVE-2011-3460, CVE-2012-0265, CVE-2012-0658, CVE-2012-0659, CVE-2012-0660, CVE-2012-0661, CVE-2012-0663, CVE-2012-0664, CVE-2012-0665, CVE-2012-0666, CVE-2012-0667, CVE-2012-0668, CVE-2012-0669, CVE-2012-0670, CVE-2012-0671
BID: 53465, 53467, 53469, 53571, 53574, 53576, 53577, 53578, 53579, 53580, 53582, 53583, 53584