SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Multimedia)  >   QuickTime Vendors:   Apple Computer
QuickTime PICT/Movie/QTVR/Indeo Bugs Let Remote Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1020841
SecurityTracker URL:  http://securitytracker.com/id/1020841
CVE Reference:   CVE-2008-3614, CVE-2008-3615, CVE-2008-3624, CVE-2008-3625, CVE-2008-3626, CVE-2008-3627, CVE-2008-3628, CVE-2008-3629, CVE-2008-3635   (Links to External Site)
Date:  Sep 9 2008
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.5.5
Description:   Several vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions.

A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system or cause the target application to crash. The code will run with the privileges of the target user.

A specially crafted PICT image can trigger an integer overflow [CVE-2008-3614]. Only Windows-based systems are affected. An anonymous researcher reported this vulnerability via iDefense.

A specially crafted movie file can trigger a flaw in the third-party Indeo v5 codec and execute arbitrary code [CVE-2008-3615]. Only Windows-based systems are affected. Paul Byrne of NGSSoftware reported this vulnerability.

A specially crafted QTVR movie file can trigger a heap overflow [CVE-2008-3624]. Roee Hay of IBM Rational Application Security Research Group reported this vulnerability.

A specially crafted QTVR movie file can trigger a stack overflow [CVE-2008-3625]. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.

A movie file with specially crafted STSZ atoms can trigger a memory corruption error and execute arbitrary code [CVE-2008-3626]. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.

A specially crafted H.264 encoded movie file can trigger a memory corruption error and execute arbitrary code [CVE-2008-3627]. An anonymous researcher and Subreption LLC reported this vulnerability via TippingPoint's Zero Day Initiative.

A specially crafted PICT image can trigger an invalid pointer error and execute arbitrary code [CVE-2008-3628]. Only Windows-based systems are affected. David Wharton reported this vulnerability.

A specially crafted PICT image can trigger an out-of-bounds memory read bug and cause the target application to crash [CVE-2008-3629]. Sergio 'shadown' Alvarez of n.runs AG reported this vulnerability.

A specially crafted movie file can trigger a stack overflow in the third-party Indeo v3.2 codec [CVE-2008-3635]. Only Windows-based systems are affected. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system or cause the target application to crash.
Solution:   The vendor has issued a fixed version (7.5.5), available from the Software Update application, or from the QuickTime Downloads site at:

http://www.apple.com/quicktime/download/

For Mac OS X v10.5 or later
The download file is named: "QuickTime755_Leopard.dmg"
Its SHA-1 digest is: 934f784a553c2d4484d298071ad6d95ea34b8b2f

For Mac OS X v10.4.9 through Mac OS X v10.4.11
The download file is named: "QuickTime755_Tiger.dmg"
Its SHA-1 digest is: dcdf58e27aad2a1e958788c0f58584605c4b8e78

For Windows Vista / XP SP2 and SP3
The download file is named: "QuickTimeInstaller.exe"
Its SHA-1 digest is: 5900ff0b8044972cb06b52dfc913c6364bf27ccc

QuickTime with iTunes for Windows XP or Vista
The download file is named: iTunes8Setup.exe
Its SHA-1 digest is: 5d4ff8ffbe9feeaed67deb317797c1d71a03c359

The vendor's advisory is available at:

http://support.apple.com/kb/HT3027

Vendor URL:  support.apple.com/kb/HT3027 (Links to External Site)
Cause:   Access control error, Boundary error, State error
Underlying OS:   UNIX (OS X), Windows (Vista), Windows (XP)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 3 2008 (Apple Issues Fix for Apple TV) QuickTime PICT/Movie/QTVR/Indeo Bugs Let Remote Users Deny Service and Execute Arbitrary Code   (Apple Product Security <product-security-noreply@lists.apple.com>)
Apple has released a fix for Apple TV.



 Source Message Contents

Date:  Tue, 9 Sep 2008 12:25:22 -0700
Subject:  APPLE-SA-2008-09-09 QuickTime 7.5.5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2008-09-09 QuickTime 7.5.5

QuickTime 7.5.5 is now available and addresses the following issues:

QuickTime
CVE-ID:  CVE-2008-3615
Available for:  Windows Vista, XP SP2 and SP3
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  An uninitialized memory access issue exists in the
third-party Indeo v5 codec for QuickTime, which does not ship with
QuickTime. Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue by not rendering content encoded with any
version of the Indeo codec. This issue does not affect systems
running Mac OS X. Credit to Paul Byrne of NGSSoftware for reporting
this issue.

QuickTime
CVE-ID:  CVE-2008-3635
Available for:  Windows Vista, XP SP2 and SP3
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  A stack buffer overflow exists in the third-party Indeo
v3.2 codec for QuickTime. Viewing a maliciously crafted movie file
may lead to an unexpected application termination or arbitrary code
execution. This update addresses the issue by not rendering content
encoded with any version of the Indeo codec. This issue does not
affect systems running Mac OS X. Credit to an anonymous researcher
working with TippingPoint's Zero Day Initiative for reporting this
issue.

QuickTime
CVE-ID:  CVE-2008-3624
Available for:  Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact:  Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  A heap buffer overflow exists in QuickTime's handling
of panorama atoms in QTVR (QuickTime Virtual Reality) movie files.
Viewing a maliciously crafted QTVR file may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved bounds checking of panorama
atoms. Credit to Roee Hay of IBM Rational Application Security
Research Group for reporting this issue.

QuickTime
CVE-ID:  CVE-2008-3625
Available for:  Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact:  Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  A stack buffer overflow exists in QuickTime's handling
of panorama atoms in QTVR (QuickTime Virtual Reality) movie files.
Viewing a maliciously crafted QTVR file may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved bounds checking of panorama
atoms. Credit to an anonymous researcher working with TippingPoint's
Zero Day Initiative for reporting this issue.

QuickTime
CVE-ID:  CVE-2008-3614
Available for:  Windows Vista, XP SP2 and SP3
Impact:  Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution
Description:  An integer overflow exists in QuickTime's handling of
PICT images. Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue by performing additional validation of
PICT images. Credit to an anonymous researcher working with the
iDefense VCP for reporting this issue.

QuickTime
CVE-ID:  CVE-2008-3626
Available for:  Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  A memory corruption issue exists in QuickTime's
handling of STSZ atoms in movie files. Viewing a maliciously crafted
movie file may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue through
improved bounds checking of STSZ atoms. Credit to an anonymous
researcher working with TippingPoint's Zero Day Initiative for
reporting this issue.

QuickTime
CVE-ID:  CVE-2008-3627
Available for:  Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption exist in QuickTime's
handling of H.264 encoded movie files. Viewing a maliciously crafted
movie file may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue by
performing additional validation of H.264 encoded movie files. Credit
to an anonymous researcher and Subreption LLC working with
TippingPoint's Zero Day Initiative for reporting this issue.

QuickTime
CVE-ID:  CVE-2008-3628
Available for:  Windows Vista, XP SP2 and SP3
Impact:  Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution
Description:  An invalid pointer issue exists in QuickTime's handling
of PICT images. Opening a maliciously crafted PICT image may lead to
an unexpected application termination or arbitrary code execution.
This update addresses the issue by correctly saving and restoring a
global variable. This issue does not affect systems running Mac OS X.
Credit to David Wharton for reporting this issue.

QuickTime
CVE-ID:  CVE-2008-3629
Available for:  Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact:  Opening a maliciously crafted PICT image may lead to an
unexpected application termination
Description:  An out-of-bounds read issue exists in QuickTime's
handling of PICT images. Opening a maliciously crafted PICT image may
lead to an unexpected application termination. This update addresses
the issue by performing additional validation of PICT images. Credit
to Sergio 'shadown' Alvarez of n.runs AG for reporting this issue.

QuickTime 7.5.5 may be obtained from the Software Update
application, or from the QuickTime Downloads site:
http://www.apple.com/quicktime/download/

For Mac OS X v10.5 or later
The download file is named:  "QuickTime755_Leopard.dmg"
Its SHA-1 digest is:  934f784a553c2d4484d298071ad6d95ea34b8b2f

For Mac OS X v10.4.9 through Mac OS X v10.4.11
The download file is named:  "QuickTime755_Tiger.dmg"
Its SHA-1 digest is:  dcdf58e27aad2a1e958788c0f58584605c4b8e78

For Windows Vista / XP SP2 and SP3
The download file is named:  "QuickTimeInstaller.exe"
Its SHA-1 digest is:  5900ff0b8044972cb06b52dfc913c6364bf27ccc

QuickTime with iTunes for Windows XP or Vista
The download file is named:  iTunes8Setup.exe
Its SHA-1 digest is:  5d4ff8ffbe9feeaed67deb317797c1d71a03c359

Information will also be posted to the Apple Security Updates
web site:  http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608

wsBVAwUBSMbNVHkodeiKZIkBAQhOWQf/ZPtSQD+v9YL5BN0/YJ2c4d2CxZ3zOLzc
dcjGxWnEhx9IfqQrg8QEBeL1KlVKudfUdpFr+2+Ca33RQzdobCJpSZTO9yvzDXH1
goallGpEUXrPQE2iDiXM06JPJJBWMFJf2YnRyrSNrSY7lk5XkLStdCNnDqlad2W6
S6uQhlnmcP8g2+lRLxB0PbnTWNQOBDgUhEibwMpsMLOVDybLglS73hLgkSegsQfy
pZwNWiItYUYgJtaUoyATPS234QNQoyjpfCSCJSQHD7SsqSRaUuxWPOYIdbjSOfU8
72WytixXRbp3v9REOqTHxy8lX2VyYeceS4MgIMgPCR7tx/SOIKJuHQ==
=3b+w
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC