source: https://www.securityfocus.com/bid/19976/info

Apple QuickTime is prone to multiple vulnerabilities because it fails to properly bounds-check and sanitize user-supplied data.

An attacker can exploit these issues to execute arbitrary code in the context of the victim user running the vulnerable application. Successful exploits may facilitate a remote compromise of affected computers.

https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28521.zip