QuickTime RTSP URL exploit

This module runs a web server waiting for vulnerable clients (QuickTime browser plugin) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted HTML page which exploits the Apple Quicktime RTSP URL Handling Vulnerability. When Outlook Express is used as mail user agent, Internet Explorer can be exploited through sending the target an e-mail that contains a link to the specially designed HTML page that triggers the attack. The vulnerability is caused due to a boundary error when handling RTSP URLs. This can be exploited to cause a stack-based buffer overflow via a specially crafted QTL file or HTML page.
Exploit Platform
Exploit Type
Product Name