Executive Summary
Summary | |
---|---|
Title | Apple Updates for Multiple Vulnerabilities |
Informations | |||
---|---|---|---|
Name | TA08-094A | First vendor Publication | 2008-04-03 |
Vendor | US-CERT | Last vendor Modification | 2008-04-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Apple QuickTime contains multiple vulnerabilities as described in the Apple Knowledgebase article HT1241. Exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition. I. Description Apple QuickTime 7.4.5 vulnerabilities in the way different types of image and media files are handled. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted image or media file that could be hosted on a web page. Note that Apple iTunes installs QuickTime, so any system with iTunes may be vulnerable. II. Impact These vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition. For further information, please see Apple knowledgebase article HT1241 III. Solution Upgrade QuickTime Upgrade to QuickTime 7.4.5. This and other updates for Mac OS X are available via Apple Update. Secure your web browser To help mitigate these and other vulnerabilities that can be exploited via a web browser, refer to Securing Your Web Browser. |
Original Source
Url : http://www.us-cert.gov/cas/techalerts/TA08-094A.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
73 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
9 % | CWE-200 | Information Exposure |
9 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
9 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
44012 | Apple QuickTime for Java (QTJava) Object Handling Applet Privilege Escalation |
44011 | Apple QuickTime Movie File Embedded URL Remote Information Disclosure |
44010 | Apple QuickTime Data Reference Atom Handling Overflow |
44009 | Apple QuickTime Movie Media Track Handling Memory Corruption Arbitrary Code E... |
44008 | Apple QuickTime quicktime.qts Library crgn Atom Parsing Overflow |
44007 | Apple QuickTime Movie Handling Channel Compositor (chan) atom Parsing |
44006 | Apple QuickTime quickTime.qts PICT File handling Memory Corruption Arbitrary ... |
44005 | Apple QuickTime Kodek Encoded PICT File Handling Overflow |
44004 | Apple QuickTime on Windows Movie Animation Codec Handling Overflow |
44003 | Apple QuickTime VR Movie obji Atom Processing Overflow |
44002 | Apple QuickTime on Windows PICT Handling Clip opcode Parsing Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-02-21 | Apple QuickTime PICT file overread buffer overflow attempt RuleID : 29434 - Revision : 2 - Type : FILE-IMAGE |
2014-01-10 | Apple QuickTime Obji Atom parsing stack buffer overflow attempt RuleID : 26109 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Apple QuickTime PICT file overread buffer overflow attempt RuleID : 18561 - Revision : 14 - Type : FILE-IMAGE |
2014-01-10 | Apple QuickTime Obji Atom parsing stack buffer overflow attempt RuleID : 13920 - Revision : 17 - Type : FILE-MULTIMEDIA |
2014-01-10 | Apple QuickTime crgn atom parsing stack buffer overflow attempt RuleID : 13897 - Revision : 9 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-04-03 | Name : The remote Mac OS X host contains an application that is affected by multiple... File : macosx_Quicktime745.nasl - Type : ACT_GATHER_INFO |
2008-04-03 | Name : The remote Windows host contains an application that is affected by multiple ... File : quicktime_745.nasl - Type : ACT_GATHER_INFO |