ID

VAR-200701-0395


CVE

CVE-2007-0462


TITLE

Mac OS X of Quicktime Such as _GetSrcBits32ARGB Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-001439

DESCRIPTION

The _GetSrcBits32ARGB function in Apple QuickDraw, as used by Quicktime 7.1.3 and other applications on Mac OS X 10.4.8 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PICT image with a malformed Alpha RGB (ARGB) record, which triggers memory corruption. Mac OS X QuickDraw is prone to a remote memory-corruption vulnerability because the software fails to properly handle malformed PICT image files. Successfully exploiting this issue allows remote attackers to corrupt memory and crash the affected software. Attackers may also be able to execute arbitrary machine code, but this has not been confirmed. Mac OS X 10.4.8 is vulnerable to this issue; other versions are also likely affected, since the vulnerable component has been included in Apple operating systems since System 6.0.4. QuickDraw is a graphics processing tool bundled in the Apple operating system. A memory corruption vulnerability exists in QuickDraw when parsing PICT graphics with malformed ARGB records. A remote attacker may exploit this vulnerability to cause the application to crash. If the user is tricked into opening a malicious graphics file, this vulnerability will be triggered, destroying the pointer sent to the _GetSrcBits32ARGB() function, resulting in a denial of service. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. The vulnerability is caused due to an error in Apple QuickDraw and can be exploited to cause the application using the QuickDraw routines to crash, when a specially crafted PICT image is processed. The vulnerability is reported in Mac OS X 10.4.8 (x86). Other versions may also be affected. SOLUTION: Do not open or use PICT images from untrusted sources. PROVIDED AND/OR DISCOVERED BY: LMH ORIGINAL ADVISORY: http://projects.info-pull.com/moab/MOAB-23-01-2007.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-0462 // JVNDB: JVNDB-2007-001439 // BID: 22207 // VULHUB: VHN-23824 // PACKETSTORM: 53936

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.6

vendor:applemodel:mac os xscope:lteversion:10.4.8

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.4.9

Trust: 0.3

sources: BID: 22207 // JVNDB: JVNDB-2007-001439 // CNNVD: CNNVD-200701-471 // NVD: CVE-2007-0462

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0462
value: HIGH

Trust: 1.0

NVD: CVE-2007-0462
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200701-471
value: CRITICAL

Trust: 0.6

VULHUB: VHN-23824
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0462
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23824
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23824 // JVNDB: JVNDB-2007-001439 // CNNVD: CNNVD-200701-471 // NVD: CVE-2007-0462

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0462

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200701-471

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 22207 // CNNVD: CNNVD-200701-471

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001439

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-23824

PATCH

title:Security Update 2007-003 / Mac OS X v10.4.9url:http://support.apple.com/kb/TA24626?viewlocale=en_US

Trust: 0.8

sources: JVNDB: JVNDB-2007-001439

EXTERNAL IDS

db:NVDid:CVE-2007-0462

Trust: 2.8

db:BIDid:22207

Trust: 2.0

db:SECUNIAid:23859

Trust: 1.8

db:VUPENid:ADV-2007-0337

Trust: 1.7

db:OSVDBid:32696

Trust: 1.7

db:JVNDBid:JVNDB-2007-001439

Trust: 0.8

db:CNNVDid:CNNVD-200701-471

Trust: 0.7

db:XFid:31698

Trust: 0.6

db:PACKETSTORMid:53875

Trust: 0.1

db:EXPLOIT-DBid:29509

Trust: 0.1

db:SEEBUGid:SSVID-83009

Trust: 0.1

db:VULHUBid:VHN-23824

Trust: 0.1

db:PACKETSTORMid:53936

Trust: 0.1

sources: VULHUB: VHN-23824 // BID: 22207 // JVNDB: JVNDB-2007-001439 // PACKETSTORM: 53936 // CNNVD: CNNVD-200701-471 // NVD: CVE-2007-0462

REFERENCES

url:http://projects.info-pull.com/moab/moab-23-01-2007.html

Trust: 2.1

url:http://www.securityfocus.com/bid/22207

Trust: 1.7

url:http://www.osvdb.org/32696

Trust: 1.7

url:http://secunia.com/advisories/23859

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/0337

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/31698

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0462

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0462

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/31698

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/0337

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/23859/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-23824 // BID: 22207 // JVNDB: JVNDB-2007-001439 // PACKETSTORM: 53936 // CNNVD: CNNVD-200701-471 // NVD: CVE-2007-0462

CREDITS

LMH lmh@info-pull.com Tom Ferris tommy@security-protocols.com

Trust: 0.6

sources: CNNVD: CNNVD-200701-471

SOURCES

db:VULHUBid:VHN-23824
db:BIDid:22207
db:JVNDBid:JVNDB-2007-001439
db:PACKETSTORMid:53936
db:CNNVDid:CNNVD-200701-471
db:NVDid:CVE-2007-0462

LAST UPDATE DATE

2025-04-10T22:45:37.697000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23824date:2017-07-29T00:00:00
db:BIDid:22207date:2015-05-12T19:35:00
db:JVNDBid:JVNDB-2007-001439date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200701-471date:2007-01-28T00:00:00
db:NVDid:CVE-2007-0462date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-23824date:2007-01-26T00:00:00
db:BIDid:22207date:2007-01-23T00:00:00
db:JVNDBid:JVNDB-2007-001439date:2012-06-26T00:00:00
db:PACKETSTORMid:53936date:2007-01-27T01:46:45
db:CNNVDid:CNNVD-200701-471date:2007-01-25T00:00:00
db:NVDid:CVE-2007-0462date:2007-01-26T01:28:00