QuickTime PICT/Movie/QTVR/Indeo Bugs Let Remote Users Deny Service and Execute Arbitrary Code
|
SecurityTracker Alert ID: 1020841 |
SecurityTracker URL: http://securitytracker.com/id/1020841
|
CVE Reference:
CVE-2008-3614, CVE-2008-3615, CVE-2008-3624, CVE-2008-3625, CVE-2008-3626, CVE-2008-3627, CVE-2008-3628, CVE-2008-3629, CVE-2008-3635
(Links to External Site)
|
Date: Sep 9 2008
|
Impact:
Denial of service via network, Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 7.5.5
|
Description:
Several vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions.
A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system or cause the target application to crash. The code will run with the privileges of the target user.
A specially crafted PICT image can trigger an integer overflow [CVE-2008-3614]. Only Windows-based systems are affected. An anonymous researcher reported this vulnerability via iDefense.
A specially crafted movie file can trigger a flaw in the third-party Indeo v5 codec and execute arbitrary code [CVE-2008-3615]. Only Windows-based systems are affected. Paul Byrne of NGSSoftware reported this vulnerability.
A specially crafted QTVR movie file can trigger a heap overflow [CVE-2008-3624]. Roee Hay of IBM Rational Application Security Research Group reported this vulnerability.
A specially crafted QTVR movie file can trigger a stack overflow [CVE-2008-3625]. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.
A movie file with specially crafted STSZ atoms can trigger a memory corruption error and execute arbitrary code [CVE-2008-3626]. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.
A specially crafted H.264 encoded movie file can trigger a memory corruption error and execute arbitrary code [CVE-2008-3627]. An anonymous researcher and Subreption LLC reported this vulnerability via TippingPoint's Zero Day Initiative.
A specially crafted PICT image can trigger an invalid pointer error and execute arbitrary code [CVE-2008-3628]. Only Windows-based systems are affected. David Wharton reported this vulnerability.
A specially crafted PICT image can trigger an out-of-bounds memory read bug and cause the target application to crash [CVE-2008-3629]. Sergio 'shadown' Alvarez of n.runs AG reported this vulnerability.
A specially crafted movie file can trigger a stack overflow in the third-party Indeo v3.2 codec [CVE-2008-3635]. Only Windows-based systems are affected. An anonymous researcher reported this vulnerability via TippingPoint's Zero Day Initiative.
|
Impact:
A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system or cause the target application to crash.
|
Solution:
The vendor has issued a fixed version (7.5.5), available from the Software Update application, or from the QuickTime Downloads site at:
http://www.apple.com/quicktime/download/
For Mac OS X v10.5 or later
The download file is named: "QuickTime755_Leopard.dmg"
Its SHA-1 digest is: 934f784a553c2d4484d298071ad6d95ea34b8b2f
For Mac OS X v10.4.9 through Mac OS X v10.4.11
The download file is named: "QuickTime755_Tiger.dmg"
Its SHA-1 digest is: dcdf58e27aad2a1e958788c0f58584605c4b8e78
For Windows Vista / XP SP2 and SP3
The download file is named: "QuickTimeInstaller.exe"
Its SHA-1 digest is: 5900ff0b8044972cb06b52dfc913c6364bf27ccc
QuickTime with iTunes for Windows XP or Vista
The download file is named: iTunes8Setup.exe
Its SHA-1 digest is: 5d4ff8ffbe9feeaed67deb317797c1d71a03c359
The vendor's advisory is available at:
http://support.apple.com/kb/HT3027
|
Vendor URL: support.apple.com/kb/HT3027 (Links to External Site)
|
Cause:
Access control error, Boundary error, State error
|
Underlying OS: UNIX (macOS/OS X), Windows (Vista), Windows (XP)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
Subject: APPLE-SA-2008-09-09 QuickTime 7.5.5
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2008-09-09 QuickTime 7.5.5
QuickTime 7.5.5 is now available and addresses the following issues:
QuickTime
CVE-ID: CVE-2008-3615
Available for: Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: An uninitialized memory access issue exists in the
third-party Indeo v5 codec for QuickTime, which does not ship with
QuickTime. Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue by not rendering content encoded with any
version of the Indeo codec. This issue does not affect systems
running Mac OS X. Credit to Paul Byrne of NGSSoftware for reporting
this issue.
QuickTime
CVE-ID: CVE-2008-3635
Available for: Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A stack buffer overflow exists in the third-party Indeo
v3.2 codec for QuickTime. Viewing a maliciously crafted movie file
may lead to an unexpected application termination or arbitrary code
execution. This update addresses the issue by not rendering content
encoded with any version of the Indeo codec. This issue does not
affect systems running Mac OS X. Credit to an anonymous researcher
working with TippingPoint's Zero Day Initiative for reporting this
issue.
QuickTime
CVE-ID: CVE-2008-3624
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A heap buffer overflow exists in QuickTime's handling
of panorama atoms in QTVR (QuickTime Virtual Reality) movie files.
Viewing a maliciously crafted QTVR file may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved bounds checking of panorama
atoms. Credit to Roee Hay of IBM Rational Application Security
Research Group for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3625
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A stack buffer overflow exists in QuickTime's handling
of panorama atoms in QTVR (QuickTime Virtual Reality) movie files.
Viewing a maliciously crafted QTVR file may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved bounds checking of panorama
atoms. Credit to an anonymous researcher working with TippingPoint's
Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3614
Available for: Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution
Description: An integer overflow exists in QuickTime's handling of
PICT images. Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue by performing additional validation of
PICT images. Credit to an anonymous researcher working with the
iDefense VCP for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3626
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue exists in QuickTime's
handling of STSZ atoms in movie files. Viewing a maliciously crafted
movie file may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue through
improved bounds checking of STSZ atoms. Credit to an anonymous
researcher working with TippingPoint's Zero Day Initiative for
reporting this issue.
QuickTime
CVE-ID: CVE-2008-3627
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption exist in QuickTime's
handling of H.264 encoded movie files. Viewing a maliciously crafted
movie file may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue by
performing additional validation of H.264 encoded movie files. Credit
to an anonymous researcher and Subreption LLC working with
TippingPoint's Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3628
Available for: Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution
Description: An invalid pointer issue exists in QuickTime's handling
of PICT images. Opening a maliciously crafted PICT image may lead to
an unexpected application termination or arbitrary code execution.
This update addresses the issue by correctly saving and restoring a
global variable. This issue does not affect systems running Mac OS X.
Credit to David Wharton for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3629
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an
unexpected application termination
Description: An out-of-bounds read issue exists in QuickTime's
handling of PICT images. Opening a maliciously crafted PICT image may
lead to an unexpected application termination. This update addresses
the issue by performing additional validation of PICT images. Credit
to Sergio 'shadown' Alvarez of n.runs AG for reporting this issue.
QuickTime 7.5.5 may be obtained from the Software Update
application, or from the QuickTime Downloads site:
http://www.apple.com/quicktime/download/
For Mac OS X v10.5 or later
The download file is named: "QuickTime755_Leopard.dmg"
Its SHA-1 digest is: 934f784a553c2d4484d298071ad6d95ea34b8b2f
For Mac OS X v10.4.9 through Mac OS X v10.4.11
The download file is named: "QuickTime755_Tiger.dmg"
Its SHA-1 digest is: dcdf58e27aad2a1e958788c0f58584605c4b8e78
For Windows Vista / XP SP2 and SP3
The download file is named: "QuickTimeInstaller.exe"
Its SHA-1 digest is: 5900ff0b8044972cb06b52dfc913c6364bf27ccc
QuickTime with iTunes for Windows XP or Vista
The download file is named: iTunes8Setup.exe
Its SHA-1 digest is: 5d4ff8ffbe9feeaed67deb317797c1d71a03c359
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608
wsBVAwUBSMbNVHkodeiKZIkBAQhOWQf/ZPtSQD+v9YL5BN0/YJ2c4d2CxZ3zOLzc
dcjGxWnEhx9IfqQrg8QEBeL1KlVKudfUdpFr+2+Ca33RQzdobCJpSZTO9yvzDXH1
goallGpEUXrPQE2iDiXM06JPJJBWMFJf2YnRyrSNrSY7lk5XkLStdCNnDqlad2W6
S6uQhlnmcP8g2+lRLxB0PbnTWNQOBDgUhEibwMpsMLOVDybLglS73hLgkSegsQfy
pZwNWiItYUYgJtaUoyATPS234QNQoyjpfCSCJSQHD7SsqSRaUuxWPOYIdbjSOfU8
72WytixXRbp3v9REOqTHxy8lX2VyYeceS4MgIMgPCR7tx/SOIKJuHQ==
=3b+w
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce@lists.apple.com)
|
|