Executive Summary

Summary
Title Apple QuickTime fails to properly handle malformed movie files
Informations
Name VU#582681 First vendor Publication 2007-07-12
Vendor VU-CERT Last vendor Modification 2007-07-12
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#582681

Apple QuickTime fails to properly handle malformed movie files

Overview

Apple QuickTime fails to properly handle malformed movie files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition.

I. Description

Apple QuickTime is multimedia software that allows users to view local and remote audio, video, and image content. An unspecified memory corruption vulnerability exists in the way QuickTime handles malformed movie files. This vulnerability can be triggered by accessing a specially crafted movie file with QuickTime, or an application that uses the QuickTime plug-in.

Note that this issue affects QuickTime installations on both Apple Mac and Microsoft Windows operating systems.

II. Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.

III. Solution

UpgradeQuickTime

Apple has addressed this issue with QuickTime 7.2 as specified in Apple Support Document 305947.

Disable QuickTime in your web browser

An attacker may be able to exploit this vulnerability by persuading a user to access a specially crafted file with a web browser. Disabling QuickTime in your web browser will defend against this attack vector. For more information, refer to the Securing Your Web Browser document.

Systems Affected

VendorStatusDate Updated
Apple Computer, Inc.Vulnerable12-Jul-2007

References


http://docs.info.apple.com/article.html?artnum=305947

Credit

This issue was reported in Apple Support Document 305947. Apple credits Jonathan 'Wolf' Rentzsch of Red Shed Software for reporting this issue.

This document was written by Jeff Gennari.

Other Information

Date Public07/11/2007
Date First Published07/12/2007 07:52:36 AM
Date Last Updated07/12/2007
CERT Advisory 
CVE NameCVE-2007-2392
Metric8.66
Document Revision8

Original Source

Url : http://www.kb.cert.org/vuls/id/582681

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 12

Open Source Vulnerability Database (OSVDB)

Id Description
36136 Apple QuickTime MOV File Handling Memory Corruption

Nessus® Vulnerability Scanner

Date Description
2007-07-12 Name : The remote Mac OS X host contains an application that is affected by multiple...
File : macosx_Quicktime72.nasl - Type : ACT_GATHER_INFO