Apple QuickTime MOV File Heap Overflow Vulnerability
BID:22843
Info
Apple QuickTime MOV File Heap Overflow Vulnerability
| Bugtraq ID: | 22843 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-0713 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 06 2007 12:00AM |
| Updated: | Mar 06 2007 08:35PM |
| Credit: | Piotr Bania is credited with the discovery of this issue. |
| Vulnerable: |
Apple QuickTime Player 7.1 |
| Not Vulnerable: |
Apple QuickTime Player 7.1.5 |
Discussion
Apple QuickTime MOV File Heap Overflow Vulnerability
Apple QuickTime is prone to a heap buffer-overflow issue because it fails to properly check boundaries on user-supplied data.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.
QuickTime 7.1 is vulnerable; other versions may also be affected.
This issue was previously discussed in BID 22827 (Apple QuickTime Multiple Unspecified Code Execution Vulnerabilities), but has been assigned its own record because of new information.
Apple QuickTime is prone to a heap buffer-overflow issue because it fails to properly check boundaries on user-supplied data.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.
QuickTime 7.1 is vulnerable; other versions may also be affected.
This issue was previously discussed in BID 22827 (Apple QuickTime Multiple Unspecified Code Execution Vulnerabilities), but has been assigned its own record because of new information.
Exploit / POC
Apple QuickTime MOV File Heap Overflow Vulnerability
To exploit this issue, an attacker must entice a victim to open a maliciously crafted MOV file.
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
To exploit this issue, an attacker must entice a victim to open a maliciously crafted MOV file.
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Solution / Fix
Apple QuickTime MOV File Heap Overflow Vulnerability
Solution:
Apple has released advisory APPLE-SA-2007-03-05 and QuickTime version 7.1.5 to address this issue. Please see the references for more information.
Solution:
Apple has released advisory APPLE-SA-2007-03-05 and QuickTime version 7.1.5 to address this issue. Please see the references for more information.
References
Apple QuickTime MOV File Heap Overflow Vulnerability
References:
References:
- Apple QuickTime Homepage (Apple)
- Quicktime Downloads Page (Apple)
- Apple QuickTime Player Remote Heap Overflow (Piotr Bania)
- APPLE-SA-2007-03-05 QuickTime 7.1.5 (Apple)