ID

VAR-200704-0420


CVE

CVE-2007-2296


TITLE

Apple QuickTime fails to properly handle malformed movie files

Trust: 0.8

sources: CERT/CC: VU#582681

DESCRIPTION

Integer overflow in the FlipFileTypeAtom_BtoN function in Apple Quicktime 7.1.5, and other versions before 7.2, allows remote attackers to execute arbitrary code via a crafted M4V (MP4) file. Apple QuickTime fails to properly handle malformed movie files. Failed exploit attempts likely result in denial-of-service conditions. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. A vulnerability exists in QuickTime's handling of MP4 files containing malformed data. Attackers may exploit this vulnerability to gain control of users' machines by tricking them into processing malicious MP4 files. The debugging information is as follows: Reason: KERN_PROTECTION_FAILURE at address: 0x00458000 0x9431cc63 in FlipFileTypeAtom_BtoN () (gdb) bt #0 0x9431cc63 in FlipFileTypeAtom_BtoN () #1 0x9431c208 in PrivateNewMovieFromDataFork_priv () #2 0x9431b04a in NewMovieFromFilePriv () #3 0x943177d5 in NewMovieFromDataRefPriv_priv () #4 0x943164b2 in NewMovieFromProperties_priv () #5 0x95a24920 in -[QTMovie initWithAttributes:error:] () #6 0x95a22f31 in +[QTMovie movieWithAttributes:error:] () #7 0x0000adb7 in -[QTPMovieDocument:File]Type readFrom:. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26034 VERIFY ADVISORY: http://secunia.com/advisories/26034/ CRITICAL: Highly critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote REVISION: 1.1 originally posted 2007-07-12 SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. 1) An unspecified error exists in the processing of H.264 movies. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted H.264 movie. 2) An unspecified error exists in the processing of movie files. 4) An integer overflow error exists in the handling of the "author" and "title" fields when parsing SMIL files. 5) A design error exists in QuickTime for Java, which can be exploited to disable security checks and execute arbitrary code when a user visits a web site containing a specially crafted Java applet. 6) A design error exists in QuickTime for Java, which can be exploited to bypass security checks and read and write to process memory. This can lead to execution of arbitrary code when a user visits a web site containing a specially crafted Java applet. 7) A design error exists in QuickTime for Java due to JDirect exposing interfaces that may allow loading arbitrary libraries and freeing arbitrary memory. 8) A design error exists in QuickTime for Java, which can be exploited to capture the user's screen content when a user visits a web site containing a specially crafted Java applet. The vulnerabilities are reported in versions prior to 7.2. SOLUTION: Update to version 7.2. QuickTime 7.2 for Mac: http://www.apple.com/support/downloads/quicktime72formac.html QuickTime 7.2 for Windows: http://www.apple.com/support/downloads/quicktime72forwindows.html PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Tom Ferris, Security-Protocols.com and Matt Slot, Ambrosia Software, Inc. 2) The vendor credits Jonathan 'Wolf' Rentzsch of Red Shed Software. 3) The vendor credits Tom Ferris, Security-Protocols.com. 4) David Vaartjes of ITsec Security Services, reported via iDefense. 5, 6, 7) The vendor credits Adam Gowdiak. 8) Reported by the vendor. CHANGELOG: 2007-07-12: Added link to US-CERT. ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=305947 iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556 OTHER REFERENCES: US-CERT VU#582681: http://www.kb.cert.org/vuls/id/582681 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-193A Apple Releases Security Updates for QuickTime Original release date: July 12, 2007 Last revised: -- Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows Overview Apple QuickTime contains multiple vulnerabilities. I. Description Apple QuickTime 7.2 resolves multiple vulnerabilities in the way Java applets and various types of media files are handled. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page. Note that QuickTime ships with Apple iTunes. For more information, please refer to the Vulnerability Notes Database. II. For further information, please see the Vulnerability Notes Database. III. Solution Upgrade QuickTime Upgrade to QuickTime 7.2. This and other updates for Mac OS X are available via Apple Update. On Microsoft Windows, QuickTime users can install the update by using the built-in auto-update mechanism, Apple Software Update, or by installing the update manually. Disabling QuickTime in your web browser may defend against this attack vector. For more information, refer to the Securing Your Web Browser document. Disabling Java in your web browser may defend against this attack vector. Instructions for disabling Java can be found in the Securing Your Web Browser document. References * Vulnerability Notes for QuickTime 7.2 - <http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_72> * About the security content of the QuickTime 7.2 Update - <http://docs.info.apple.com/article.html?artnum=305947> * How to tell if Software Update for Windows is working correctly when no updates are available - <http://docs.info.apple.com/article.html?artnum=304263> * Apple QuickTime 7.2 for Windows - <http://www.apple.com/support/downloads/quicktime72forwindows.html> * Apple QuickTime 7.2 for Mac - <http://www.apple.com/support/downloads/quicktime72formac.html> * Standalone Apple QuickTime Player - <http://www.apple.com/quicktime/download/standalone.html> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA07-193A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-193A Feedback VU#582681" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History Thursday July 12, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRpZsJ/RFkHkM87XOAQKLMgf9GpK/pbKTrSe0yKCRMt8Z4lMKl8VE+Rqr 4i8GfVXYUcBKbTlA8TTyf5ucbmCVAnjGJIq0W6X5gLBeA0QxCZ6qto/iPqviuvoV 8tu92/DuerYOkZMvJcn4RjAlMhM9CWCqJh1QG6R2Csn8AyeKEOFDiKYqoDzT+LoQ zojxmlNJIbUvIIGv8Z12Xkr1LLDmD4rs1nfDEBZm7yLTWRItmXpvSidftdUGETDZ +ok1SIhkZEbPNT7gAox9RZaKyIRHV7V4wZwqDd3weo6T7UPlhsgRqe88h1R5Yfq8 a7ePH0WSbTCqdGmuoM+nir4iDldoxB8OpbMUQH1nmWcDmc9xv++MHQ== =EV1X -----END PGP SIGNATURE-----

Trust: 2.88

sources: NVD: CVE-2007-2296 // CERT/CC: VU#582681 // JVNDB: JVNDB-2007-000521 // BID: 23652 // VULHUB: VHN-25658 // PACKETSTORM: 57697 // PACKETSTORM: 57713

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.6

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:version

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.8

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.2

Trust: 0.3

sources: CERT/CC: VU#582681 // BID: 23652 // JVNDB: JVNDB-2007-000521 // CNNVD: CNNVD-200704-552 // NVD: CVE-2007-2296

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2296
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#582681
value: 8.66

Trust: 0.8

NVD: CVE-2007-2296
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200704-552
value: CRITICAL

Trust: 0.6

VULHUB: VHN-25658
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2296
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25658
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25658 // JVNDB: JVNDB-2007-000521 // CNNVD: CNNVD-200704-552 // NVD: CVE-2007-2296

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-25658 // JVNDB: JVNDB-2007-000521 // NVD: CVE-2007-2296

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 57713 // CNNVD: CNNVD-200704-552

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-200704-552

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000521

PATCH

title:QuickTime 7.2 for Macurl:http://www.apple.com/support/downloads/quicktime72formac.html

Trust: 0.8

title:QuickTime 7.2 for Windowsurl:http://www.apple.com/support/downloads/quicktime72forwindows.html

Trust: 0.8

title:About the security content of QuickTime 7.2url:http://docs.info.apple.com/article.html?artnum=305947-en

Trust: 0.8

title:About the security content of QuickTime 7.2url:http://docs.info.apple.com/article.html?artnum=305947-ja

Trust: 0.8

title:アップル - QuickTimeurl:http://www.apple.com/jp/quicktime/download/win.html

Trust: 0.8

title:QuickTime 7.2 for Windowsurl:http://www.apple.com/jp/ftp-info/reference/quicktime72forwindows.html

Trust: 0.8

title:QuickTime 7.2 for Macurl:http://www.apple.com/jp/ftp-info/reference/quicktime72formac.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000521

EXTERNAL IDS

db:BIDid:23652

Trust: 2.8

db:NVDid:CVE-2007-2296

Trust: 2.8

db:SECUNIAid:26034

Trust: 2.7

db:USCERTid:TA07-193A

Trust: 2.6

db:SECTRACKid:1017967

Trust: 2.5

db:SECTRACKid:1018373

Trust: 1.7

db:VUPENid:ADV-2007-2510

Trust: 1.7

db:OSVDBid:35578

Trust: 1.7

db:CERT/CCid:VU#582681

Trust: 0.9

db:USCERTid:SA07-193A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000521

Trust: 0.8

db:XFid:34069

Trust: 0.6

db:APPLEid:APPLE-SA-2007-07-11

Trust: 0.6

db:CERT/CCid:TA07-193A

Trust: 0.6

db:CNNVDid:CNNVD-200704-552

Trust: 0.6

db:VULHUBid:VHN-25658

Trust: 0.1

db:PACKETSTORMid:57697

Trust: 0.1

db:PACKETSTORMid:57713

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25658 // BID: 23652 // JVNDB: JVNDB-2007-000521 // PACKETSTORM: 57697 // PACKETSTORM: 57713 // CNNVD: CNNVD-200704-552 // NVD: CVE-2007-2296

REFERENCES

url:http://www.securityfocus.com/bid/23652

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta07-193a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1017967

Trust: 2.5

url:http://secunia.com/advisories/26034

Trust: 2.5

url:http://security-protocols.com/sp-x46-advisory.php

Trust: 2.0

url:http://docs.info.apple.com/article.html?artnum=305947

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2007/jul/msg00001.html

Trust: 1.7

url:http://www.osvdb.org/35578

Trust: 1.7

url:http://www.securitytracker.com/id?1018373

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/2510

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/2510

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34069

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2296

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-193a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-193a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2296

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-193a.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/34069

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/582681

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72formac.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/26034/

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72forwindows.html

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304263>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta07-193a.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=305947>

Trust: 0.1

url:http://www.apple.com/quicktime/download/standalone.html>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72formac.html>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72forwindows.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=quicktime_72>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25658 // BID: 23652 // JVNDB: JVNDB-2007-000521 // PACKETSTORM: 57697 // PACKETSTORM: 57713 // CNNVD: CNNVD-200704-552 // NVD: CVE-2007-2296

CREDITS

Tom Ferris※ tommy@security-protocols.com

Trust: 0.6

sources: CNNVD: CNNVD-200704-552

SOURCES

db:CERT/CCid:VU#582681
db:VULHUBid:VHN-25658
db:BIDid:23652
db:JVNDBid:JVNDB-2007-000521
db:PACKETSTORMid:57697
db:PACKETSTORMid:57713
db:CNNVDid:CNNVD-200704-552
db:NVDid:CVE-2007-2296

LAST UPDATE DATE

2025-04-10T20:41:59.560000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#582681date:2007-07-13T00:00:00
db:VULHUBid:VHN-25658date:2017-07-29T00:00:00
db:BIDid:23652date:2007-07-12T04:27:00
db:JVNDBid:JVNDB-2007-000521date:2007-07-24T00:00:00
db:CNNVDid:CNNVD-200704-552date:2007-04-27T00:00:00
db:NVDid:CVE-2007-2296date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#582681date:2007-07-12T00:00:00
db:VULHUBid:VHN-25658date:2007-04-26T00:00:00
db:BIDid:23652date:2007-04-25T00:00:00
db:JVNDBid:JVNDB-2007-000521date:2007-07-24T00:00:00
db:PACKETSTORMid:57697date:2007-07-13T00:55:11
db:PACKETSTORMid:57713date:2007-07-13T01:43:24
db:CNNVDid:CNNVD-200704-552date:2007-04-26T00:00:00
db:NVDid:CVE-2007-2296date:2007-04-26T20:19:00