exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 29650

Secunia Security Advisory 29650
Posted Apr 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to disclose potentially sensitive information or compromise a vulnerable system.

tags | advisory, vulnerability
systems | apple
SHA-256 | f5df540a4ae9cfcbbf111c4873bfdfdcbf36697a1601bf7d653ebd1f5d7d6d50

Secunia Security Advisory 29650

Change Mirror Download
----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Apple QuickTime Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA29650

VERIFY ADVISORY:
https://secunia.com/advisories/29650/

CRITICAL:
Highly critical

IMPACT:
Exposure of sensitive information, DoS, System access

WHERE:
>From remote

SOFTWARE:
Apple QuickTime 7.x
https://secunia.com/product/5090/

DESCRIPTION:
Some vulnerabilities have been reported in Apple QuickTime, which can
be exploited by malicious people to disclose potentially sensitive
information or compromise a vulnerable system.

1) An implementation error in QuickTime for Java allows untrusted
Java applets to deserialize objects provided by QTJava. This can be
exploited to disclose sensitive information or execute arbitrary code
e.g. when a user visits a malicious web page.

2) An unspecified error in the handling of external URLs embedded in
movie files can lead to information disclosure.

3) An input validation error in the handling of data reference atoms
within movie files can be exploited to cause a buffer overflow when a
specially crafted movie is viewed.

4) An unspecified error in the handling of movie media tracks can be
exploited to cause a memory corruption when a specially crafted movie
is viewed.

5) A boundary error in the parsing of "crgn" atoms can be exploited
to cause a heap-based buffer overflow when a specially crafted movie
file is viewed.

6) A boundary error in the parsing of "chan" atoms can be exploited
to cause a heap-based buffer overflow when a specially crafted movie
file is viewed.

7) A boundary error in the handling of PICT records can be exploited
to cause a heap-based buffer overflow when a specially crafted PICT
image is viewed.

8) A boundary error in the handling of error messages when processing
PICT images can be exploited to cause a heap-based buffer overflow.

NOTE: This vulnerability does not affect Mac OS X systems.

9) A boundary error in the handling of Animation codec content can be
exploited to cause a heap-based buffer overflow when a specially
crafted movie file is viewed.

NOTE: This vulnerability does not affect Mac OS X systems.

10) A boundary error in the parsing of "obji" atoms can be exploited
to cause a stack-based buffer overflow when a specially crafted
QuickTime VR movie file is viewed.

11) A boundary error in the parsing of the Clip opcode can be
exploited to cause a heap-based buffer overflow when a specially
crafted PICT image file is viewed.

Successful exploitation of these vulnerabilities may allow execution
of arbitrary code.

SOLUTION:
Update to version 7.4.5.

QuickTime 7.4.5 for Windows:
https://www.apple.com/support/downloads/quicktime745forwindows.html

QuickTime 7.4.5 for Leopard:
https://www.apple.com/support/downloads/quicktime745forleopard.html

QuickTime 7.4.5 for Panther:
https://www.apple.com/support/downloads/quicktime745forpanther.html

QuickTime 7.4.5 for Tiger:
https://www.apple.com/support/downloads/quicktime745fortiger.html

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Adam Gowdiak
2) Jorge Escala of Open Tech Solutions, and Vinoo Thomas and Rahul
Mohandas of McAfee Avert Labs
3) Chris Ries of Carnegie Mellon University Computing Services
5) Sanbin Li working with ZDI
6) An anonymous researcher working with ZDI
7) bugfree working with ZDI
8) Ruben Santamarta of Reversemode.com working with ZDI
9) An anonymous researcher working with ZDI
10) An anonymous researcher working with ZDI
11) Wei Wang of McAfee AVERT labs

ORIGINAL ADVISORY:
Apple:
https://support.apple.com/kb/HT1241

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
https://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close