Executive Summary

Summary
Title Apple QuickTime code execution vulnerability
Informations
Name VU#797875 First vendor Publication 2007-11-14
Vendor VU-CERT Last vendor Modification 2007-11-14
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#797875

Apple QuickTime code execution vulnerability

Overview

Apple QuickTime contains a buffer overflow vulnerability. If exploited, this vulnerability may allow an attacker to execute code.

I. Description

Apple QuickTime is a media player that includes a browser plugin. QuickTime can use atom containers to organize movies and music tracks.

From Apple Article ID: 306896"About the security content of QuickTime 7.3":

    A memory corruption issue exists in QuickTime's handling of image description atoms. By enticing a user to open a maliciously crafted movie file, an attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of QuickTime image descriptions.
To exploit this vulnerability, an attacker would have to convince a user to open a specially crafted QuickTime movie which could be hosted on a web page or sent in an email.

II. Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause QuickTime to crash.

III. Solution

Upgrade

Apple has addressed this issue in QuickTime 7.3.

Systems Affected

VendorStatusDate Updated
Apple Computer, Inc.Vulnerable14-Nov-2007

References


http://docs.info.apple.com/article.html?artnum=306896
http://developer.apple.com/quicktime/qttutorial/qtatoms.html

Credit

Apple credits Dylan Ashe of Adobe Systems Incorporated for reporting this issue.

This document was written by Ryan Giobbi.

Other Information

Date Public11/05/2007
Date First Published11/14/2007 06:01:29 PM
Date Last Updated11/14/2007
CERT Advisory 
CVE NameCVE-2007-2395
Metric26.50
Document Revision11

Original Source

Url : http://www.kb.cert.org/vuls/id/797875

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 169

Open Source Vulnerability Database (OSVDB)

Id Description
38550 Apple QuickTime Movie File Image Description Arbitrary Code Execution

Nessus® Vulnerability Scanner

Date Description
2007-11-06 Name : The remote Mac OS X host contains an application that is affected by multiple...
File : macosx_Quicktime73.nasl - Type : ACT_GATHER_INFO
2007-11-06 Name : The remote Windows host contains an application that is affected by multiple ...
File : quicktime_73.nasl - Type : ACT_GATHER_INFO