source: http://www.securityfocus.com/bid/19976/info
Apple QuickTime is prone to multiple vulnerabilities because it fails to properly bounds-check and sanitize user-supplied data.
An attacker can exploit these issues to execute arbitrary code in the context of the victim user running the vulnerable application. Successful exploits may facilitate a remote compromise of affected computers.
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28521.zip