Executive Summary

Summary
Title Apple QuickTime "file
Informations
Name VU#132419 First vendor Publication 2008-06-10
Vendor VU-CERT Last vendor Modification 2008-06-10
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#132419

Apple QuickTime "file: URL" arbitrary code execution

Overview

Apple QuickTime does not properly handle "file: URLs" which may allow an attacker to execute arbitrary code.

I. Description

Apple QuickTime is a multiplatform multimedia software architecture which provides file format converters for more than 250 common image, video, and audio file formats.

Per the Apple advisory About the security content of QuickTime 7.5:

    A URL handling issue exists in QuickTime's handling of file: URLs. This may allow arbitrary applications and files to be launched when a user plays maliciously crafted QuickTime content in QuickTime Player.

II. Impact

By convincing a user to play a maliciously crafted QuickTime file, an attacker may be able to execute arbitrary code on a vulnerable system.

III. Solution

Apple has addressed this vulnerability in QuickTime 7.5 release.

Systems Affected

VendorStatusDate Updated
Apple Computer, Inc.Vulnerable10-Jun-2008

References


http://support.apple.com/kb/HT1991

Credit

Apple credits to Vinoo Thomas and Rahul Mohandas of McAfee Avert Labs, and Petko D. (pdp) Petkov of GNUCITIZEN working with TippingPoint's Zero Day Initiative for reporting this issue.

This document was written by Joseph Pruszynski.

Other Information

Date Public06/09/2008
Date First Published06/10/2008 03:23:13 PM
Date Last Updated06/10/2008
CERT Advisory
CVE NameCVE-2008-1585
US-CERT Technical Alerts
Metric18.25
Document Revision8

Original Source

Url : http://www.kb.cert.org/vuls/id/132419

CWE : Common Weakness Enumeration

idName
CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

OpenVAS Exploits

DateDescription
2008-09-26Name : Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities (Win)
File : nvt/gb_apple_quicktime_mult_vuln_win.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
46073Apple QuickTime Embedded SMIL Text qt:next Attribute Arbitrary File Execution

Snort® IPS/IDS

DateDescription
2014-01-10Apple QuickTime SMIL qtnext redirect file execution attempt
RuleID : 15487 - Revision : 10 - Type : FILE-MULTIMEDIA

Nessus® Vulnerability Scanner

DateDescription
2008-06-10Name : The remote Windows host contains an application that is affected by multiple ...
File : quicktime_75.nasl - Type : ACT_GATHER_INFO
2008-06-10Name : The remote Mac OS X host contains an application that is affected by multiple...
File : macosx_Quicktime75.nasl - Type : ACT_GATHER_INFO