{"vuid":"VU#319771","idnumber":"319771","name":"Apple QuickTime for Java may allow Java applets to gain elevated privileges","keywords":["Apple","QuickTime","Java","elevated privileges","untrusted applets"],"overview":"Apple QuickTime for Java contains a vulnerability that may allow a malicious Java applet to gain elevated privileges.","clean_desc":"Apple QuickTime is a media player that includes a browser plugin. QuickTime for Java provides APIs which allow Java developers to include multimedia in Java applets. From Apple Article ID: 306896 \"About the security content of QuickTime 7.3\": Multiple vulnerabilities exist in QuickTime for Java, which may allow untrusted Java applets to obtain elevated privileges. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker may cause the disclosure of sensitive information and arbitrary code execution with elevated privileges. This update addresses the issues by making QuickTime for Java no longer accessible to untrusted Java applets. Credit to Adam Gowdiak for reporting this issue. To exploit this vulnerability, an attacker would have to convince a user to open a specially crafted Java applet which could be hosted on a webpage.","impact":"A remote, unauthenticated attacker may be able to take any action that can be performed by the user running QuickTime.","resolution":"Upgrade\nApple has addressed this issue in QuickTime 7.3.","workarounds":"Disable Java \nUntil updates can be applied, disabling the Java plugin may mitigate this vulnerability. For instructions on how to disable Java in your browser, see Securing Your Web Browser.","sysaffected":"","thanks":"Apple credits Adam Gowdiak for reporting this issue","author":"This document was written by Ryan Giobbi.","public":["http://docs.info.apple.com/article.html?artnum=306896","http://developer.apple.com/quicktime/qtjava/","http://www.us-cert.gov/reading_room/securing_browser/"],"cveids":["CVE-2007-3751"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-11-06T17:44:32Z","publicdate":"2007-11-05T00:00:00Z","datefirstpublished":"2007-11-08T16:23:34Z","dateupdated":"2007-11-08T17:26:27Z","revision":5,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"14","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"7","cam_attackeraccessrequired":"15","cam_scorecurrent":"7.53046875","cam_scorecurrentwidelyknown":"10.18828125","cam_scorecurrentwidelyknownexploited":"19.04765625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.53046875,"vulnote":null}