ID

VAR-200701-0596


CVE

CVE-2007-0015


TITLE

Apple QuickTime RTSP buffer overflow

Trust: 0.8

sources: CERT/CC: VU#442497

DESCRIPTION

Buffer overflow in Apple QuickTime 7.1.3 allows remote attackers to execute arbitrary code via a long rtsp:// URI. Apple QuickTime is prone to a remote buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input prior to copying it to an insufficiently sized stack-based memory buffer. Attackers exploit this issue by coercing targeted users to access malicious HTML or QTL files or by executing malicious JavaScript code. QuickTime 7.1.3 is vulnerable to this issue; other versions may also be affected. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. A remote attacker can construct something like \"rtsp://[any character]:[ > 256 bytes] The URL string of \" lures the user to click, and the overflow occurs when the system calls QuickTime processing, and any command of the attacker is executed. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-005A Apple QuickTime RTSP Buffer Overflow Original release date: January 05, 2007 Last revised: -- Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows Note that Apple iTunes and other software using the vulnerable QuickTime components are also affected. I. Public exploit code is available that demonstrates how opening a .QTL file triggers the buffer overflow. However, we have confirmed that other attack vectors for the vulnerability also exist. Possible attack vectors include * a web page that uses the QuickTime plug-in or ActiveX control * a web page that uses the rtsp:// protocol * a file that is associated with the QuickTime Player US-CERT is tracking this issue as VU#442497. This reference number corresponds to CVE-2007-0015. Note that this vulnerability affects QuickTime on Microsoft Windows and Apple Mac platforms. Although web pages can be used as attack vectors, this vulnerability is not dependent on the specific web browser that is used. II. III. Solution We are currently unaware of a solution to this problem. Until a solution becomes available, the workarounds provided in US-CERT Vulnerability Note VU#442497 are strongly encouraged. <http://www.kb.cert.org/vuls/id/442497> IV. References * US-CERT Vulnerability Note VU#442497 - <http://www.kb.cert.org/vuls/id/442497> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * CVE-2007-0015 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0015> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA07-005A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-005A Feedback VU#442497" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 05, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRZ7D9OxOF3G+ig+rAQLG+Af/e+VhtMJEDuzVbT47HRdINgIRiOceCx4u DZFbMaUvYu4hjGu9f+T6AaGWR9FQj1ZzWDYf/JHY67NCSkwJdFY4Th1vR09BXJGy lmAzlj7+l3U4UeR+rEud0ajP8qCO7vwRGP4rPUVkcqgaBXqdyfgQbNHtwIpw6w/z eFYyUp/2EA1vHeTGdPNAkQTupuC95kA0QsiONCVv9xTqg7xnlcXBTwKz+T/DcWig LDLgPMupim8+ruhkzCCOVveIFQPBdXN5Aem/Fvpmhi2V5HRBc65vKaDoLzBpt4BZ Wdbeud6ljPjm0JLPvy84Gn7qFcjCu3WP3Nayd7rhbClFZSWyGilM+Q== =RrHt -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. This can be exploited to cause a stack-based buffer overflow via a specially crafted QTL file with an overly long (more than 256 bytes) "src" parameter (e.g. "rtsp://[any character]:[>256 bytes]"). SOLUTION: Do not open untrusted QTL files. PROVIDED AND/OR DISCOVERED BY: LMH ORIGINAL ADVISORY: http://projects.info-pull.com/moab/MOAB-01-01-2007.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2007-0015 // CERT/CC: VU#442497 // JVNDB: JVNDB-2007-000005 // BID: 21829 // VULHUB: VHN-23377 // PACKETSTORM: 53507 // PACKETSTORM: 53358

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 2.4

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

sources: CERT/CC: VU#442497 // BID: 21829 // JVNDB: JVNDB-2007-000005 // CNNVD: CNNVD-200701-001 // NVD: CVE-2007-0015

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0015
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#442497
value: 27.00

Trust: 0.8

NVD: CVE-2007-0015
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200701-001
value: MEDIUM

Trust: 0.6

VULHUB: VHN-23377
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-0015
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23377
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#442497 // VULHUB: VHN-23377 // JVNDB: JVNDB-2007-000005 // CNNVD: CNNVD-200701-001 // NVD: CVE-2007-0015

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0015

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 53507 // CNNVD: CNNVD-200701-001

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200701-001

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000005

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-23377

PATCH

title:Security Update 2007-001 (Panther)url:http://www.apple.com/support/downloads/securityupdate2007001panther.html

Trust: 0.8

title:Security Update 2007-001 (Universal)url:http://www.apple.com/support/downloads/securityupdate2007001universal.html

Trust: 0.8

title:Security Update 2007-001url:http://docs.info.apple.com/article.html?artnum=304989-en

Trust: 0.8

title:Security Update 2007-001url:http://docs.info.apple.com/article.html?artnum=304989-ja

Trust: 0.8

title:アップル - QuickTimeurl:http://www.apple.com/jp/quicktime/

Trust: 0.8

title:Security Update 2007-001 (Universal)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007001universal.html

Trust: 0.8

title:Security Update 2007-001 (Panther)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007001panther.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000005

EXTERNAL IDS

db:BIDid:21829

Trust: 3.6

db:SECUNIAid:23540

Trust: 3.4

db:CERT/CCid:VU#442497

Trust: 3.4

db:NVDid:CVE-2007-0015

Trust: 2.9

db:USCERTid:TA07-005A

Trust: 2.6

db:SECTRACKid:1017461

Trust: 2.5

db:OSVDBid:31023

Trust: 2.5

db:EXPLOIT-DBid:3064

Trust: 1.7

db:VUPENid:ADV-2007-0001

Trust: 1.7

db:XFid:31203

Trust: 1.4

db:JVNDBid:JVNDB-2007-000005

Trust: 0.8

db:CNNVDid:CNNVD-200701-001

Trust: 0.7

db:MILW0RMid:3064

Trust: 0.6

db:CERT/CCid:TA07-005A

Trust: 0.6

db:APPLEid:APPLE-SA-2007-01-23

Trust: 0.6

db:PACKETSTORMid:53507

Trust: 0.2

db:PACKETSTORMid:53412

Trust: 0.1

db:PACKETSTORMid:82966

Trust: 0.1

db:EXPLOIT-DBid:3072

Trust: 0.1

db:EXPLOIT-DBid:16527

Trust: 0.1

db:SEEBUGid:SSVID-71041

Trust: 0.1

db:VULHUBid:VHN-23377

Trust: 0.1

db:PACKETSTORMid:53358

Trust: 0.1

sources: CERT/CC: VU#442497 // VULHUB: VHN-23377 // BID: 21829 // JVNDB: JVNDB-2007-000005 // PACKETSTORM: 53507 // PACKETSTORM: 53358 // CNNVD: CNNVD-200701-001 // NVD: CVE-2007-0015

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=304989

Trust: 2.8

url:http://projects.info-pull.com/moab/moab-01-01-2007.html

Trust: 2.6

url:http://lists.apple.com/archives/security-announce/2007/jan/msg00000.html

Trust: 2.5

url:http://secunia.com/blog/7/

Trust: 2.5

url:http://www.securityfocus.com/bid/21829

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta07-005a.html

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/442497

Trust: 2.5

url:http://www.osvdb.org/31023

Trust: 2.5

url:http://securitytracker.com/id?1017461

Trust: 2.5

url:http://secunia.com/advisories/23540

Trust: 2.5

url:http://isc.sans.org/diary.html?storyid=2094

Trust: 1.7

url:http://landonf.bikemonkey.org/code/macosx/moab_day_1.20070102060815.15950.zadder.local.html

Trust: 1.7

url:http://search.info.apple.com/?search=go&q=2007-001

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2007/0001

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/31203

Trust: 1.4

url:https://www.exploit-db.com/exploits/3064

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/0001

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/31203

Trust: 1.1

url:http://secunia.com/advisories/23540/

Trust: 0.9

url:http://www.securityfocus.com/bid/21829

Trust: 0.8

url:http://plugindoc.mozdev.org/faqs/uninstall.html

Trust: 0.8

url:http://support.microsoft.com/kb/240797

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=106704

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=304264

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0015

Trust: 0.8

url:http://www.jpcert.or.jp/at/2007/at070016.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-005a/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23442497/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-005a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0015

Trust: 0.8

url:http://www.milw0rm.com/exploits/3064

Trust: 0.6

url:http://milw0rm.com/exploits/3064

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://applefun.blogspot.com/2007/01/moab-01-01-2007-apple-quicktime-rtsp.html

Trust: 0.3

url:http://www.computerdefense.org/?p=225

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-0015

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta07-005a.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/442497>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0015>

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#442497 // VULHUB: VHN-23377 // BID: 21829 // JVNDB: JVNDB-2007-000005 // PACKETSTORM: 53507 // PACKETSTORM: 53358 // CNNVD: CNNVD-200701-001 // NVD: CVE-2007-0015

CREDITS

LMH lmh@info-pull.com

Trust: 0.6

sources: CNNVD: CNNVD-200701-001

SOURCES

db:CERT/CCid:VU#442497
db:VULHUBid:VHN-23377
db:BIDid:21829
db:JVNDBid:JVNDB-2007-000005
db:PACKETSTORMid:53507
db:PACKETSTORMid:53358
db:CNNVDid:CNNVD-200701-001
db:NVDid:CVE-2007-0015

LAST UPDATE DATE

2025-04-10T23:20:03.744000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#442497date:2007-01-25T00:00:00
db:VULHUBid:VHN-23377date:2017-10-19T00:00:00
db:BIDid:21829date:2007-11-15T00:36:00
db:JVNDBid:JVNDB-2007-000005date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200701-001date:2007-01-25T00:00:00
db:NVDid:CVE-2007-0015date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#442497date:2007-01-02T00:00:00
db:VULHUBid:VHN-23377date:2007-01-01T00:00:00
db:BIDid:21829date:2007-01-01T00:00:00
db:JVNDBid:JVNDB-2007-000005date:2007-04-01T00:00:00
db:PACKETSTORMid:53507date:2007-01-13T20:37:59
db:PACKETSTORMid:53358date:2007-01-02T18:09:24
db:CNNVDid:CNNVD-200701-001date:2007-01-01T00:00:00
db:NVDid:CVE-2007-0015date:2007-01-01T23:28:00