ID

VAR-200707-0545


CVE

CVE-2007-2392


TITLE

Apple QuickTime fails to properly handle malformed movie files

Trust: 0.8

sources: CERT/CC: VU#582681

DESCRIPTION

Apple Quicktime before 7.2 on Mac OS X 10.3.9 and 10.4.9 allows user-assisted remote attackers to execute arbitrary code via a crafted movie file that triggers memory corruption. Apple QuickTime fails to properly handle malformed movie files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition. Apple QuickTime is prone to an information-disclosure and multiple remote code-execution vulnerabilities. Remote attackers may exploit these issues by enticing victims into opening maliciously crafted files or visiting maliciously crafted websites. Failed exploit attempts of remote code-execution issues may result in denial-of-service conditions. Successful exploits of the information-disclosure issue may lead to further attacks. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26034 VERIFY ADVISORY: http://secunia.com/advisories/26034/ CRITICAL: Highly critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote REVISION: 1.1 originally posted 2007-07-12 SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. 1) An unspecified error exists in the processing of H.264 movies. 2) An unspecified error exists in the processing of movie files. 3) An integer overflow error exists in the handling of .m4v files and can be exploited to execute arbitrary code when a user accesses a specially crafted .m4v file. 4) An integer overflow error exists in the handling of the "author" and "title" fields when parsing SMIL files. 5) A design error exists in QuickTime for Java, which can be exploited to disable security checks and execute arbitrary code when a user visits a web site containing a specially crafted Java applet. 6) A design error exists in QuickTime for Java, which can be exploited to bypass security checks and read and write to process memory. This can lead to execution of arbitrary code when a user visits a web site containing a specially crafted Java applet. 7) A design error exists in QuickTime for Java due to JDirect exposing interfaces that may allow loading arbitrary libraries and freeing arbitrary memory. This can be exploited to execute arbitrary code when a user visits a web site containing a specially crafted Java applet. 8) A design error exists in QuickTime for Java, which can be exploited to capture the user's screen content when a user visits a web site containing a specially crafted Java applet. The vulnerabilities are reported in versions prior to 7.2. SOLUTION: Update to version 7.2. QuickTime 7.2 for Mac: http://www.apple.com/support/downloads/quicktime72formac.html QuickTime 7.2 for Windows: http://www.apple.com/support/downloads/quicktime72forwindows.html PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Tom Ferris, Security-Protocols.com and Matt Slot, Ambrosia Software, Inc. 2) The vendor credits Jonathan 'Wolf' Rentzsch of Red Shed Software. 3) The vendor credits Tom Ferris, Security-Protocols.com. 4) David Vaartjes of ITsec Security Services, reported via iDefense. 5, 6, 7) The vendor credits Adam Gowdiak. 8) Reported by the vendor. CHANGELOG: 2007-07-12: Added link to US-CERT. ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=305947 iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556 OTHER REFERENCES: US-CERT VU#582681: http://www.kb.cert.org/vuls/id/582681 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-193A Apple Releases Security Updates for QuickTime Original release date: July 12, 2007 Last revised: -- Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows Overview Apple QuickTime contains multiple vulnerabilities. I. Description Apple QuickTime 7.2 resolves multiple vulnerabilities in the way Java applets and various types of media files are handled. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page. Note that QuickTime ships with Apple iTunes. For more information, please refer to the Vulnerability Notes Database. II. For further information, please see the Vulnerability Notes Database. III. Solution Upgrade QuickTime Upgrade to QuickTime 7.2. This and other updates for Mac OS X are available via Apple Update. On Microsoft Windows, QuickTime users can install the update by using the built-in auto-update mechanism, Apple Software Update, or by installing the update manually. Disabling QuickTime in your web browser may defend against this attack vector. For more information, refer to the Securing Your Web Browser document. Disabling Java in your web browser may defend against this attack vector. Instructions for disabling Java can be found in the Securing Your Web Browser document. References * Vulnerability Notes for QuickTime 7.2 - <http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_72> * About the security content of the QuickTime 7.2 Update - <http://docs.info.apple.com/article.html?artnum=305947> * How to tell if Software Update for Windows is working correctly when no updates are available - <http://docs.info.apple.com/article.html?artnum=304263> * Apple QuickTime 7.2 for Windows - <http://www.apple.com/support/downloads/quicktime72forwindows.html> * Apple QuickTime 7.2 for Mac - <http://www.apple.com/support/downloads/quicktime72formac.html> * Standalone Apple QuickTime Player - <http://www.apple.com/quicktime/download/standalone.html> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA07-193A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-193A Feedback VU#582681" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History Thursday July 12, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRpZsJ/RFkHkM87XOAQKLMgf9GpK/pbKTrSe0yKCRMt8Z4lMKl8VE+Rqr 4i8GfVXYUcBKbTlA8TTyf5ucbmCVAnjGJIq0W6X5gLBeA0QxCZ6qto/iPqviuvoV 8tu92/DuerYOkZMvJcn4RjAlMhM9CWCqJh1QG6R2Csn8AyeKEOFDiKYqoDzT+LoQ zojxmlNJIbUvIIGv8Z12Xkr1LLDmD4rs1nfDEBZm7yLTWRItmXpvSidftdUGETDZ +ok1SIhkZEbPNT7gAox9RZaKyIRHV7V4wZwqDd3weo6T7UPlhsgRqe88h1R5Yfq8 a7ePH0WSbTCqdGmuoM+nir4iDldoxB8OpbMUQH1nmWcDmc9xv++MHQ== =EV1X -----END PGP SIGNATURE-----

Trust: 2.88

sources: NVD: CVE-2007-2392 // CERT/CC: VU#582681 // JVNDB: JVNDB-2007-000522 // BID: 24873 // VULHUB: VHN-25754 // PACKETSTORM: 57697 // PACKETSTORM: 57713

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion: -

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:version

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.3.9

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:quicktimescope:neversion:7.2

Trust: 0.3

sources: CERT/CC: VU#582681 // BID: 24873 // JVNDB: JVNDB-2007-000522 // CNNVD: CNNVD-200707-279 // NVD: CVE-2007-2392

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2392
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#582681
value: 8.66

Trust: 0.8

NVD: CVE-2007-2392
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200707-279
value: CRITICAL

Trust: 0.6

VULHUB: VHN-25754
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2392
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25754
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25754 // JVNDB: JVNDB-2007-000522 // CNNVD: CNNVD-200707-279 // NVD: CVE-2007-2392

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2392

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 57713 // CNNVD: CNNVD-200707-279

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200707-279

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000522

PATCH

title:QuickTime 7.2 for Macurl:http://www.apple.com/support/downloads/quicktime72formac.html

Trust: 0.8

title:QuickTime 7.2 for Windowsurl:http://www.apple.com/support/downloads/quicktime72forwindows.html

Trust: 0.8

title:About the security content of QuickTime 7.2url:http://docs.info.apple.com/article.html?artnum=305947-en

Trust: 0.8

title:About the security content of QuickTime 7.2url:http://docs.info.apple.com/article.html?artnum=305947-ja

Trust: 0.8

title:アップル - QuickTimeurl:http://www.apple.com/jp/quicktime/download/win.html

Trust: 0.8

title:QuickTime 7.2 for Windowsurl:http://www.apple.com/jp/ftp-info/reference/quicktime72forwindows.html

Trust: 0.8

title:QuickTime 7.2 for Macurl:http://www.apple.com/jp/ftp-info/reference/quicktime72formac.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000522

EXTERNAL IDS

db:CERT/CCid:VU#582681

Trust: 3.7

db:USCERTid:TA07-193A

Trust: 2.9

db:NVDid:CVE-2007-2392

Trust: 2.8

db:BIDid:24873

Trust: 2.8

db:SECUNIAid:26034

Trust: 2.7

db:SECTRACKid:1018373

Trust: 1.7

db:VUPENid:ADV-2007-2510

Trust: 1.7

db:OSVDBid:36136

Trust: 1.7

db:XFid:35353

Trust: 1.4

db:USCERTid:SA07-193A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000522

Trust: 0.8

db:CNNVDid:CNNVD-200707-279

Trust: 0.7

db:CERT/CCid:TA07-193A

Trust: 0.6

db:APPLEid:APPLE-SA-2007-07-11

Trust: 0.6

db:VULHUBid:VHN-25754

Trust: 0.1

db:PACKETSTORMid:57697

Trust: 0.1

db:PACKETSTORMid:57713

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25754 // BID: 24873 // JVNDB: JVNDB-2007-000522 // PACKETSTORM: 57697 // PACKETSTORM: 57713 // CNNVD: CNNVD-200707-279 // NVD: CVE-2007-2392

REFERENCES

url:http://www.kb.cert.org/vuls/id/582681

Trust: 2.9

url:http://www.us-cert.gov/cas/techalerts/ta07-193a.html

Trust: 2.8

url:http://www.securityfocus.com/bid/24873

Trust: 2.5

url:http://secunia.com/advisories/26034

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=305947

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2007/jul/msg00001.html

Trust: 1.7

url:http://osvdb.org/36136

Trust: 1.7

url:http://www.securitytracker.com/id?1018373

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/2510

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/35353

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/2510

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35353

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2392

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-193a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-193a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2392

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-193a.html

Trust: 0.8

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556

Trust: 0.4

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

url:/archive/1/473882

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72formac.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/26034/

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72forwindows.html

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304263>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta07-193a.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=305947>

Trust: 0.1

url:http://www.apple.com/quicktime/download/standalone.html>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72formac.html>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72forwindows.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=quicktime_72>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25754 // BID: 24873 // JVNDB: JVNDB-2007-000522 // PACKETSTORM: 57697 // PACKETSTORM: 57713 // CNNVD: CNNVD-200707-279 // NVD: CVE-2007-2392

CREDITS

Jonathan 'Wolf' RentzschDavid VaartjesAdam Gowdiak※ zupa@man.poznan.pl

Trust: 0.6

sources: CNNVD: CNNVD-200707-279

SOURCES

db:CERT/CCid:VU#582681
db:VULHUBid:VHN-25754
db:BIDid:24873
db:JVNDBid:JVNDB-2007-000522
db:PACKETSTORMid:57697
db:PACKETSTORMid:57713
db:CNNVDid:CNNVD-200707-279
db:NVDid:CVE-2007-2392

LAST UPDATE DATE

2025-04-10T20:40:17.863000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#582681date:2007-07-13T00:00:00
db:VULHUBid:VHN-25754date:2018-10-30T00:00:00
db:BIDid:24873date:2007-09-05T18:21:00
db:JVNDBid:JVNDB-2007-000522date:2007-07-24T00:00:00
db:CNNVDid:CNNVD-200707-279date:2007-07-18T00:00:00
db:NVDid:CVE-2007-2392date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#582681date:2007-07-12T00:00:00
db:VULHUBid:VHN-25754date:2007-07-15T00:00:00
db:BIDid:24873date:2007-07-11T00:00:00
db:JVNDBid:JVNDB-2007-000522date:2007-07-24T00:00:00
db:PACKETSTORMid:57697date:2007-07-13T00:55:11
db:PACKETSTORMid:57713date:2007-07-13T01:43:24
db:CNNVDid:CNNVD-200707-279date:2007-07-15T00:00:00
db:NVDid:CVE-2007-2392date:2007-07-15T21:30:00