CVE-2008-3627

N/A Unknown
Published: September 11, 2008 Modified: April 23, 2026
View on NVD

Description

Apple QuickTime before 7.5.5 does not properly handle (1) MDAT atoms in MP4 video files within QuickTimeH264.qtx, (2) MDAT atoms in mov video files within QuickTimeH264.scalar, and (3) AVC1 atoms in an unknown media type within an unspecified component, which allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via a crafted, H.264 encoded movie file.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html
Source: cve@mitre.org
Mailing List Vendor Advisory
http://secunia.com/advisories/31821
Source: cve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1020841
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://support.apple.com/kb/HT3027
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/31086
Source: cve@mitre.org
Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2527
Source: cve@mitre.org
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-060/
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-08-061/
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-08-062/
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Vendor Advisory
http://secunia.com/advisories/31821
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1020841
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://support.apple.com/kb/HT3027
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/496163/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/496175/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/496176/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31086
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2527
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-060/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-08-061/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-08-062/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16164
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

26 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apple