Executive Summary

Summary
Title Apple Updates for Multiple Vulnerabilities
Informations
Name TA08-094A First vendor Publication 2008-04-03
Vendor US-CERT Last vendor Modification 2008-04-03
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Apple QuickTime contains multiple vulnerabilities as described in the Apple Knowledgebase article HT1241. Exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

I. Description

Apple QuickTime 7.4.5 vulnerabilities in the way different types of image and media files are handled. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted image or media file that could be hosted on a web page.

Note that Apple iTunes installs QuickTime, so any system with iTunes may be vulnerable.

II. Impact

These vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition. For further information, please see Apple knowledgebase article HT1241
about the security content of QuickTime 7.4.5

III. Solution

Upgrade QuickTime

Upgrade to QuickTime 7.4.5. This and other updates for Mac OS X are available via Apple Update.

Secure your web browser

To help mitigate these and other vulnerabilities that can be exploited via a web browser, refer to Securing Your Web Browser.

Original Source

Url : http://www.us-cert.gov/cas/techalerts/TA08-094A.html

CWE : Common Weakness Enumeration

% Id Name
73 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
9 % CWE-200 Information Exposure
9 % CWE-94 Failure to Control Generation of Code ('Code Injection')
9 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 203

Open Source Vulnerability Database (OSVDB)

Id Description
44012 Apple QuickTime for Java (QTJava) Object Handling Applet Privilege Escalation

44011 Apple QuickTime Movie File Embedded URL Remote Information Disclosure

44010 Apple QuickTime Data Reference Atom Handling Overflow

44009 Apple QuickTime Movie Media Track Handling Memory Corruption Arbitrary Code E...

44008 Apple QuickTime quicktime.qts Library crgn Atom Parsing Overflow

44007 Apple QuickTime Movie Handling Channel Compositor (chan) atom Parsing

44006 Apple QuickTime quickTime.qts PICT File handling Memory Corruption Arbitrary ...

44005 Apple QuickTime Kodek Encoded PICT File Handling Overflow

44004 Apple QuickTime on Windows Movie Animation Codec Handling Overflow

44003 Apple QuickTime VR Movie obji Atom Processing Overflow

44002 Apple QuickTime on Windows PICT Handling Clip opcode Parsing Overflow

Snort® IPS/IDS

Date Description
2014-02-21 Apple QuickTime PICT file overread buffer overflow attempt
RuleID : 29434 - Revision : 2 - Type : FILE-IMAGE
2014-01-10 Apple QuickTime Obji Atom parsing stack buffer overflow attempt
RuleID : 26109 - Revision : 5 - Type : FILE-MULTIMEDIA
2014-01-10 Apple QuickTime PICT file overread buffer overflow attempt
RuleID : 18561 - Revision : 14 - Type : FILE-IMAGE
2014-01-10 Apple QuickTime Obji Atom parsing stack buffer overflow attempt
RuleID : 13920 - Revision : 17 - Type : FILE-MULTIMEDIA
2014-01-10 Apple QuickTime crgn atom parsing stack buffer overflow attempt
RuleID : 13897 - Revision : 9 - Type : FILE-MULTIMEDIA

Nessus® Vulnerability Scanner

Date Description
2008-04-03 Name : The remote Mac OS X host contains an application that is affected by multiple...
File : macosx_Quicktime745.nasl - Type : ACT_GATHER_INFO
2008-04-03 Name : The remote Windows host contains an application that is affected by multiple ...
File : quicktime_745.nasl - Type : ACT_GATHER_INFO