SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Mac OS X Vendors:   Apple Computer
Mac OS X Pixlet Video Memory Corruption Error Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020132
SecurityTracker URL:  http://securitytracker.com/id/1020132
CVE Reference:   CVE-2008-1577   (Links to External Site)
Date:  May 29 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 10.5.3
Description:   A vulnerability was reported in Mac OS X in the Pixlet codec. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted movie file that, when loaded by the target user, will trigger a memory corruption error in the Pixlet codec and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Impact:   A remote user can create a movie file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix as part of Security Update 2008-003 and Mac OS X v10.5.3, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2008-003 or Mac OS X v10.5.3.

For Mac OS X v10.5.2
The download file is named: "MacOSXUpd10.5.3.dmg"
Its SHA-1 digest is: 017ef905e5653b04e2455da261e804a72bf40139

For Mac OS X v10.5 - v10.5.1
The download file is named: "MacOSXUpdCombo10.5.3.dmg"
Its SHA-1 digest is: 69acd7399de25f1548675d660fdf24eb401e3de3

For Mac OS X Server v10.5.2
The download file is named: "MacOSXServerUpd10.5.3.dmg"
Its SHA-1 digest is: 336c9dceca724eab0b8c9db3943be3f9ecf244a4

For Mac OS X Server v10.5 - v10.5.1
The download file is named: "MacOSXServerUpdCombo10.5.3.dmg"
Its SHA-1 digest is: fdb2187d19ce21caecd3c3ba6b6fa6f65c9c3a4f

For Mac OS X v10.4.11 (Intel)
The download file is named: "SecUpd2008-003Intel.dmg"
Its SHA-1 digest is: 8f84d2f757c2fb277b139f72ef501dc894620e97

For Mac OS X v10.4.11 (PowerPC)
The download file is named: "SecUpd2008-003PPC.dmg"
Its SHA-1 digest is: 51e98d988c5bb09d4b1052199d90a9d65af7c8e7

For Mac OS X Server v10.4.11 (Universal)
The download file is named: "SecUpdSrvr2008-003Univ.dmg"
Its SHA-1 digest is: 337a05956b5a6e962b286a91beee9eb217a0175c

For Mac OS X Server v10.4.11 (PowerPC)
The download file is named: "SecUpdSrvr2008-003PPC.dmg"
Its SHA-1 digest is: 94cab2b4e5d26a284c5d91d0fe4dc20b4e9cfc97

The vendor's advisory is available at:

http://support.apple.com/kb/HT1897

Vendor URL:  support.apple.com/kb/HT1897 (Links to External Site)
Cause:   Boundary error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Wed, 28 May 2008 15:59:23 -0700
Subject:  APPLE-SA-2008-05-28 Security Update 2008-003 and Mac OS X v10.5.3

Apple Pixlet Video
CVE-ID:  CVE-2008-1577
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact:  Opening a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues exist in the handling
of files using the Pixlet codec. Opening a maliciously crafted movie
file may cause an unexpected application termination or arbitrary
code execution. This update addresses the issue through improved
bounds checking.
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC