Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to
via a QuickTime Media Link (QTL) file with an embed XML element and a
qtnext parameter that identifies resources outside of the original
domain. NOTE: as of 20070912, this issue has been demonstrated by
using instances of Components.interfaces.nsILocalFile and
Components.interfaces.nsIProcess to execute arbitrary local files
within Firefox and possibly Internet Explorer.
Note:References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
BUGTRAQ:20060920 Backdooring MP3 files (plus QuickTime issues and Cross-context Scripting)
Disclaimer: The entry creation date may reflect when
the CVE-ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
This is an entry on the CVE
list, which standardizes names for security