Secunia Advisory: SA29650
Release Date: 2008-04-03
Critical: Highly critical
Impact: Exposure of sensitive information
DoS
System access
Where: From remote
Solution Status: Vendor Patch
Software: Apple QuickTime 7.x
CVE reference:
CVE-2008-1013 (Secunia mirror)
CVE-2008-1014 (Secunia mirror)
CVE-2008-1015 (Secunia mirror)
CVE-2008-1016 (Secunia mirror)
CVE-2008-1017 (Secunia mirror)
CVE-2008-1018 (Secunia mirror)
CVE-2008-1019 (Secunia mirror)
CVE-2008-1020 (Secunia mirror)
CVE-2008-1021 (Secunia mirror)
CVE-2008-1022 (Secunia mirror)
CVE-2008-1023 (Secunia mirror)
Description:
Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to disclose potentially sensitive information or compromise a vulnerable system.
1) An implementation error in QuickTime for Java allows untrusted Java applets to deserialize objects provided by QTJava. This can be exploited to disclose sensitive information or execute arbitrary code e.g. when a user visits a malicious web page.
2) An unspecified error in the handling of external URLs embedded in movie files can lead to information disclosure.
3) An input validation error in the handling of data reference atoms within movie files can be exploited to cause a buffer overflow when a specially crafted movie is viewed.
4) An unspecified error in the handling of movie media tracks can be exploited to cause a memory corruption when a specially crafted movie is viewed.
5) A boundary error in the parsing of "crgn" atoms can be exploited to cause a heap-based buffer overflow when a specially crafted movie file is viewed.
6) A boundary error in the parsing of "chan" atoms can be exploited to cause a heap-based buffer overflow when a specially crafted movie file is viewed.
7) A boundary error in the handling of PICT records can be exploited to cause a heap-based buffer overflow when a specially crafted PICT image is viewed.
8) A boundary error in the handling of error messages when processing PICT images can be exploited to cause a heap-based buffer overflow.
NOTE: This vulnerability does not affect Mac OS X systems.
9) A boundary error in the handling of Animation codec content can be exploited to cause a heap-based buffer overflow when a specially crafted movie file is viewed.
NOTE: This vulnerability does not affect Mac OS X systems.
10) A boundary error in the parsing of "obji" atoms can be exploited to cause a stack-based buffer overflow when a specially crafted QuickTime VR movie file is viewed.
11) A boundary error in the parsing of the Clip opcode can be exploited to cause a heap-based buffer overflow when a specially crafted PICT image file is viewed.
Successful exploitation of these vulnerabilities may allow execution of arbitrary code.
Solution:
Update to version 7.4.5.
Bollettino di Sicurezza
Release Date: 2008-04-03
Critical: Highly critical
Impact: Exposure of sensitive information
DoS
System access
Where: From remote
Solution Status: Vendor Patch
Software: Apple QuickTime 7.x
CVE reference:
CVE-2008-1013 (Secunia mirror)
CVE-2008-1014 (Secunia mirror)
CVE-2008-1015 (Secunia mirror)
CVE-2008-1016 (Secunia mirror)
CVE-2008-1017 (Secunia mirror)
CVE-2008-1018 (Secunia mirror)
CVE-2008-1019 (Secunia mirror)
CVE-2008-1020 (Secunia mirror)
CVE-2008-1021 (Secunia mirror)
CVE-2008-1022 (Secunia mirror)
CVE-2008-1023 (Secunia mirror)
Description:
Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to disclose potentially sensitive information or compromise a vulnerable system.
1) An implementation error in QuickTime for Java allows untrusted Java applets to deserialize objects provided by QTJava. This can be exploited to disclose sensitive information or execute arbitrary code e.g. when a user visits a malicious web page.
2) An unspecified error in the handling of external URLs embedded in movie files can lead to information disclosure.
3) An input validation error in the handling of data reference atoms within movie files can be exploited to cause a buffer overflow when a specially crafted movie is viewed.
4) An unspecified error in the handling of movie media tracks can be exploited to cause a memory corruption when a specially crafted movie is viewed.
5) A boundary error in the parsing of "crgn" atoms can be exploited to cause a heap-based buffer overflow when a specially crafted movie file is viewed.
6) A boundary error in the parsing of "chan" atoms can be exploited to cause a heap-based buffer overflow when a specially crafted movie file is viewed.
7) A boundary error in the handling of PICT records can be exploited to cause a heap-based buffer overflow when a specially crafted PICT image is viewed.
8) A boundary error in the handling of error messages when processing PICT images can be exploited to cause a heap-based buffer overflow.
NOTE: This vulnerability does not affect Mac OS X systems.
9) A boundary error in the handling of Animation codec content can be exploited to cause a heap-based buffer overflow when a specially crafted movie file is viewed.
NOTE: This vulnerability does not affect Mac OS X systems.
10) A boundary error in the parsing of "obji" atoms can be exploited to cause a stack-based buffer overflow when a specially crafted QuickTime VR movie file is viewed.
11) A boundary error in the parsing of the Clip opcode can be exploited to cause a heap-based buffer overflow when a specially crafted PICT image file is viewed.
Successful exploitation of these vulnerabilities may allow execution of arbitrary code.
Solution:
Update to version 7.4.5.
Bollettino di Sicurezza