ID

VAR-200205-0049


CVE

CVE-2002-0252


TITLE

Apple QuickTime Content-Type Remote Buffer Overflow Vulnerability

Trust: 0.9

sources: BID: 4064 // CNNVD: CNNVD-200205-077

DESCRIPTION

Buffer overflow in Apple QuickTime Player 5.01 and 5.02 allows remote web servers to execute arbitrary code via a response containing a long Content-Type MIME header. Apple QuickTime is a freely available media player. It runs on a number of platforms including MacOS and Windows 9x/ME/NT/2000/XP operating systems. Apple QuickTime For Windows does not perform sufficient bounds checking of the "Content-Type" header. This issue may be exploited if a server responds with a maliciously crafted "Content-Type" header to a HTTP request for a media file. A "Content-Type" header of 500+ characters is sufficient to trigger this condition, causing stack variables to be overwritten in the process. This issue may allow a malicious server to execute arbitrary attacker-supplied code on the host of a client who makes a request for a media file. This may result in a remote compromise, possibly with elevated privileges (depending on the environment). This issue may also allow a hostile server to introduce malicious code into a system running the vulnerable software. Exploitation of this issue requires that a user makes a request to the malicious server. However, this may also be exploited by a malicious host that is serving streaming media content to the client. It should be noted that the QuickTime player broadcasts information about the version and the operating environment via the "User-Agent" header of the HTTP request, which may aid a malicious server in successfully exploiting this issue. This vulnerability was reported for Japanese versions of Apple QuickTime Player, running on Japanese versions of the Microsoft Operating System. It is not known if other versions and environments are affected

Trust: 1.26

sources: NVD: CVE-2002-0252 // BID: 4064 // VULHUB: VHN-4645

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:quicktime player for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime player for windowsscope:eqversion:5.0.1

Trust: 0.3

sources: BID: 4064 // CNNVD: CNNVD-200205-077 // NVD: CVE-2002-0252

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0252
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200205-077
value: HIGH

Trust: 0.6

VULHUB: VHN-4645
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2002-0252
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4645
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4645 // CNNVD: CNNVD-200205-077 // NVD: CVE-2002-0252

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0252

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200205-077

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200205-077

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-4645

EXTERNAL IDS

db:NVDid:CVE-2002-0252

Trust: 2.0

db:BIDid:4064

Trust: 2.0

db:EXPLOIT-DBid:4673

Trust: 1.7

db:CNNVDid:CNNVD-200205-077

Trust: 0.7

db:XFid:8126

Trust: 0.6

db:BUGTRAQid:20020208 [SPSADVISORY#46]APPLE QUICKTIME PLAYER "CONTENT-TYPE" BUFFER OVERFLOW

Trust: 0.6

db:MILW0RMid:4673

Trust: 0.6

db:SEEBUGid:SSVID-75120

Trust: 0.1

db:SEEBUGid:SSVID-65014

Trust: 0.1

db:EXPLOIT-DBid:21286

Trust: 0.1

db:VULHUBid:VHN-4645

Trust: 0.1

sources: VULHUB: VHN-4645 // BID: 4064 // CNNVD: CNNVD-200205-077 // NVD: CVE-2002-0252

REFERENCES

url:http://www.securityfocus.com/bid/4064

Trust: 1.7

url:http://www.iss.net/security_center/static/8126.php

Trust: 1.7

url:https://www.exploit-db.com/exploits/4673

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=101320742616105&w=2

Trust: 1.0

url:http://www.milw0rm.com/exploits/4673

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=101320742616105&w=2

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=101320742616105&w=2

Trust: 0.1

sources: VULHUB: VHN-4645 // BID: 4064 // CNNVD: CNNVD-200205-077 // NVD: CVE-2002-0252

CREDITS

This issue was publicized in a Shadow Penguin Security advisory on February 9th, 2002.

Trust: 0.9

sources: BID: 4064 // CNNVD: CNNVD-200205-077

SOURCES

db:VULHUBid:VHN-4645
db:BIDid:4064
db:CNNVDid:CNNVD-200205-077
db:NVDid:CVE-2002-0252

LAST UPDATE DATE

2025-04-03T22:19:26.963000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4645date:2017-10-11T00:00:00
db:BIDid:4064date:2009-07-11T10:56:00
db:CNNVDid:CNNVD-200205-077date:2009-08-19T00:00:00
db:NVDid:CVE-2002-0252date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-4645date:2002-05-29T00:00:00
db:BIDid:4064date:2002-02-08T00:00:00
db:CNNVDid:CNNVD-200205-077date:2002-05-29T00:00:00
db:NVDid:CVE-2002-0252date:2002-05-29T04:00:00