SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Multimedia)  >   QuickTime Vendors:   Apple Computer
(Apple Issues Fix for Windows) QuickTime Buffer Overflow in Processing BMP Images May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1011968
SecurityTracker URL:  http://securitytracker.com/id/1011968
CVE Reference:   CAN-2004-0926   (Links to External Site)
Date:  Oct 27 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.5.2
Description:   A vulnerability was reported in QuickTime. A remote user may be able to execute arbitrary code on the target system.

Apple reported that a remote user can create a specially crafted BMP image that, when viewed by the target user with QuickTime, will trigger a heap overflow and execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

Impact:   A remote user can execute arbitrary code on the target user's system with the privileges of the target user.
Solution:   Apple has released a fixed version (6.5.2) for Windows (in addition to the previously reported fix for Mac OS X):

http://www.apple.com/quicktime/download/

Vendor URL:  www.apple.com/quicktime/download/ (Links to External Site)
Cause:   Boundary error
Underlying OS:   UNIX (OS X), Windows (Me), Windows (98), Windows (2000), Windows (XP)

Message History:   This archive entry is a follow-up to the message listed below.
Oct 4 2004 QuickTime Buffer Overflow in Processing BMP Images May Let Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Wed, 27 Oct 2004 10:40:37 -0700
Subject:  APPLE-SA-2004-10-27 QuickTime 6.5.2


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2004-10-27 QuickTime 6.5.2

QuickTime 6.5.2 is now available and delivers the following security
enhancements:

CVE-ID: CAN-2004-0988
Available for:  Microsoft Windows XP, Microsoft Windows 2000,
Microsoft Windows ME and Microsoft Windows 98
Impact:  An integer overflow that may be exploitable in an HTML
environment
Description:  A sign extension of an overflowed small integer can
result in a very large number being passed to a memory move function.
The fix prevents the small integer from overflowing.  This issue
does not exist in QuickTime for Mac OS X systems.  Credit to John
Heasman of Next Generation Security Software Ltd. for reporting this
issue.

CVE-ID: CAN-2004-0926
Available for:  Mac OS X v10.3.x, Mac OS X Server v10.3.x, Mac OS X
v10.2.8, Mac OS X Server v10.2.8, Microsoft Windows XP, Microsoft
Windows 2000, Microsoft Windows ME and Microsoft Windows 98
Impact:  A heap buffer overflow could allow attackers to execute
arbitrary code
Description:  Flaws in decoding the BMP image type could overwrite
heap memory and potentially allow the execution of arbitrary code
hidden in an image. This is the same security enhancement that was
made available in Security Update 2004-09-30, and can be deployed on
the additional system configurations covered by this QuickTime
update.

QuickTime 6.5.2 may be obtained from the Software Update pane in
System Preferences, or Apple's QuickTime web site:
http://www.apple.com/quicktime/download/

Information will also be posted to the Apple Product Security
web site:
http://www.apple.com/support/security/security_updates.html

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/security_pgp.html

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQEVAwUBQX/cepyw5owIz4TQAQJvWQf/d8U8EBHIAwLFi733oTbmasx4cHsxdaPv
BdyqxTkOONMfAv4sUye4i+92cCvxZTtL1T5GG0fAEMlJiPHUylC8Tx/yKUrU1pEF
yqRSCFCxaJVE8Bzag3ZczBPnWG6jIttxOawocoIIoyPeX5BzgeeYd0e7KDDUgwUV
mtlTFK9mlgSI8QB+xq8sptHcdqDVOMmTAxANR3Nq4UMK3N0771SkZThRhstiDVkx
EWqQdFZ5YBUwug8pULclYPazlNKPp6Hq8Fziafi1q4gSa12vVmFSm4OC26xUtb3l
7xX55W77K337gFPmH0yFwEsg2MnZ2PO2T4TsPMgp6rIRmsFoHfq4ew==
=K7tG
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/security-announce/gst%40securitytracker.com

This email sent to ***********************

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC