source: https://www.securityfocus.com/bid/19976/info Apple QuickTime is prone to multiple vulnerabilities because it fails to properly bounds-check and sanitize user-supplied data. An attacker can exploit these issues to execute arbitrary code in the context of the victim user running the vulnerable application. Successful exploits may facilitate a remote compromise of affected computers. https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28521.zip