A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must open a malicious file.
bcd127620a65d689b5a899b714c2eb878a2ad2d75e5b861343ac2474827a014a