ID

VAR-200707-0550


CVE

CVE-2007-2402


TITLE

Apple QuickTime fails to properly handle malformed movie files

Trust: 0.8

sources: CERT/CC: VU#582681

DESCRIPTION

QuickTime for Java in Apple Quicktime before 7.2 does not perform sufficient "access control," which allows remote attackers to obtain sensitive information (screen content) via crafted Java applets. Apple QuickTime fails to properly handle malformed movie files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition. Apple QuickTime is prone to an information-disclosure and multiple remote code-execution vulnerabilities. Remote attackers may exploit these issues by enticing victims into opening maliciously crafted files or visiting maliciously crafted websites. Failed exploit attempts of remote code-execution issues may result in denial-of-service conditions. Successful exploits of the information-disclosure issue may lead to further attacks. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26034 VERIFY ADVISORY: http://secunia.com/advisories/26034/ CRITICAL: Highly critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote REVISION: 1.1 originally posted 2007-07-12 SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. 1) An unspecified error exists in the processing of H.264 movies. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted H.264 movie. 2) An unspecified error exists in the processing of movie files. 3) An integer overflow error exists in the handling of .m4v files and can be exploited to execute arbitrary code when a user accesses a specially crafted .m4v file. 4) An integer overflow error exists in the handling of the "author" and "title" fields when parsing SMIL files. 5) A design error exists in QuickTime for Java, which can be exploited to disable security checks and execute arbitrary code when a user visits a web site containing a specially crafted Java applet. 6) A design error exists in QuickTime for Java, which can be exploited to bypass security checks and read and write to process memory. This can lead to execution of arbitrary code when a user visits a web site containing a specially crafted Java applet. 7) A design error exists in QuickTime for Java due to JDirect exposing interfaces that may allow loading arbitrary libraries and freeing arbitrary memory. This can be exploited to execute arbitrary code when a user visits a web site containing a specially crafted Java applet. The vulnerabilities are reported in versions prior to 7.2. SOLUTION: Update to version 7.2. QuickTime 7.2 for Mac: http://www.apple.com/support/downloads/quicktime72formac.html QuickTime 7.2 for Windows: http://www.apple.com/support/downloads/quicktime72forwindows.html PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Tom Ferris, Security-Protocols.com and Matt Slot, Ambrosia Software, Inc. 2) The vendor credits Jonathan 'Wolf' Rentzsch of Red Shed Software. 3) The vendor credits Tom Ferris, Security-Protocols.com. 4) David Vaartjes of ITsec Security Services, reported via iDefense. 5, 6, 7) The vendor credits Adam Gowdiak. 8) Reported by the vendor. CHANGELOG: 2007-07-12: Added link to US-CERT. ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=305947 iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556 OTHER REFERENCES: US-CERT VU#582681: http://www.kb.cert.org/vuls/id/582681 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-193A Apple Releases Security Updates for QuickTime Original release date: July 12, 2007 Last revised: -- Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows Overview Apple QuickTime contains multiple vulnerabilities. I. Description Apple QuickTime 7.2 resolves multiple vulnerabilities in the way Java applets and various types of media files are handled. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page. Note that QuickTime ships with Apple iTunes. For more information, please refer to the Vulnerability Notes Database. II. For further information, please see the Vulnerability Notes Database. III. Solution Upgrade QuickTime Upgrade to QuickTime 7.2. This and other updates for Mac OS X are available via Apple Update. On Microsoft Windows, QuickTime users can install the update by using the built-in auto-update mechanism, Apple Software Update, or by installing the update manually. Disabling QuickTime in your web browser may defend against this attack vector. For more information, refer to the Securing Your Web Browser document. Disabling Java in your web browser may defend against this attack vector. Instructions for disabling Java can be found in the Securing Your Web Browser document. References * Vulnerability Notes for QuickTime 7.2 - <http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_72> * About the security content of the QuickTime 7.2 Update - <http://docs.info.apple.com/article.html?artnum=305947> * How to tell if Software Update for Windows is working correctly when no updates are available - <http://docs.info.apple.com/article.html?artnum=304263> * Apple QuickTime 7.2 for Windows - <http://www.apple.com/support/downloads/quicktime72forwindows.html> * Apple QuickTime 7.2 for Mac - <http://www.apple.com/support/downloads/quicktime72formac.html> * Standalone Apple QuickTime Player - <http://www.apple.com/quicktime/download/standalone.html> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA07-193A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-193A Feedback VU#582681" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History Thursday July 12, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRpZsJ/RFkHkM87XOAQKLMgf9GpK/pbKTrSe0yKCRMt8Z4lMKl8VE+Rqr 4i8GfVXYUcBKbTlA8TTyf5ucbmCVAnjGJIq0W6X5gLBeA0QxCZ6qto/iPqviuvoV 8tu92/DuerYOkZMvJcn4RjAlMhM9CWCqJh1QG6R2Csn8AyeKEOFDiKYqoDzT+LoQ zojxmlNJIbUvIIGv8Z12Xkr1LLDmD4rs1nfDEBZm7yLTWRItmXpvSidftdUGETDZ +ok1SIhkZEbPNT7gAox9RZaKyIRHV7V4wZwqDd3weo6T7UPlhsgRqe88h1R5Yfq8 a7ePH0WSbTCqdGmuoM+nir4iDldoxB8OpbMUQH1nmWcDmc9xv++MHQ== =EV1X -----END PGP SIGNATURE-----

Trust: 2.88

sources: NVD: CVE-2007-2402 // CERT/CC: VU#582681 // JVNDB: JVNDB-2007-000526 // BID: 24873 // VULHUB: VHN-25764 // PACKETSTORM: 57697 // PACKETSTORM: 57713

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion: -

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:version

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.0.8

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:quicktimescope:neversion:7.2

Trust: 0.3

sources: CERT/CC: VU#582681 // BID: 24873 // JVNDB: JVNDB-2007-000526 // CNNVD: CNNVD-200707-265 // NVD: CVE-2007-2402

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2402
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#582681
value: 8.66

Trust: 0.8

NVD: CVE-2007-2402
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200707-265
value: MEDIUM

Trust: 0.6

VULHUB: VHN-25764
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-2402
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2007-2402
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-25764
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25764 // JVNDB: JVNDB-2007-000526 // CNNVD: CNNVD-200707-265 // NVD: CVE-2007-2402

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-25764 // JVNDB: JVNDB-2007-000526 // NVD: CVE-2007-2402

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 57713 // CNNVD: CNNVD-200707-265

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200707-265

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000526

PATCH

title:QuickTime 7.2 for Macurl:http://www.apple.com/support/downloads/quicktime72formac.html

Trust: 0.8

title:QuickTime 7.2 for Windowsurl:http://www.apple.com/support/downloads/quicktime72forwindows.html

Trust: 0.8

title:About the security content of QuickTime 7.2url:http://docs.info.apple.com/article.html?artnum=305947-en

Trust: 0.8

title:About the security content of QuickTime 7.2url:http://docs.info.apple.com/article.html?artnum=305947-ja

Trust: 0.8

title:アップル - QuickTimeurl:http://www.apple.com/jp/quicktime/download/win.html

Trust: 0.8

title:QuickTime 7.2 for Windowsurl:http://www.apple.com/jp/ftp-info/reference/quicktime72forwindows.html

Trust: 0.8

title:QuickTime 7.2 for Macurl:http://www.apple.com/jp/ftp-info/reference/quicktime72formac.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000526

EXTERNAL IDS

db:USCERTid:TA07-193A

Trust: 2.9

db:NVDid:CVE-2007-2402

Trust: 2.8

db:BIDid:24873

Trust: 2.8

db:SECUNIAid:26034

Trust: 2.7

db:SECTRACKid:1018373

Trust: 1.7

db:OSVDBid:36131

Trust: 1.7

db:VUPENid:ADV-2007-2510

Trust: 1.7

db:XFid:35361

Trust: 1.4

db:CERT/CCid:VU#582681

Trust: 1.2

db:USCERTid:SA07-193A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000526

Trust: 0.8

db:APPLEid:APPLE-SA-2007-07-11

Trust: 0.6

db:CERT/CCid:TA07-193A

Trust: 0.6

db:CNNVDid:CNNVD-200707-265

Trust: 0.6

db:VULHUBid:VHN-25764

Trust: 0.1

db:PACKETSTORMid:57697

Trust: 0.1

db:PACKETSTORMid:57713

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25764 // BID: 24873 // JVNDB: JVNDB-2007-000526 // PACKETSTORM: 57697 // PACKETSTORM: 57713 // CNNVD: CNNVD-200707-265 // NVD: CVE-2007-2402

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta07-193a.html

Trust: 2.8

url:http://www.securityfocus.com/bid/24873

Trust: 2.5

url:http://secunia.com/advisories/26034

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=305947

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2007/jul/msg00001.html

Trust: 1.7

url:http://osvdb.org/36131

Trust: 1.7

url:http://www.securitytracker.com/id?1018373

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/2510

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/35361

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/2510

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35361

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2402

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-193a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-193a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2402

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-193a.html

Trust: 0.8

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556

Trust: 0.4

url:http://www.kb.cert.org/vuls/id/582681

Trust: 0.4

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

url:/archive/1/473882

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72formac.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/26034/

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72forwindows.html

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304263>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta07-193a.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=305947>

Trust: 0.1

url:http://www.apple.com/quicktime/download/standalone.html>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72formac.html>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime72forwindows.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=quicktime_72>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

sources: CERT/CC: VU#582681 // VULHUB: VHN-25764 // BID: 24873 // JVNDB: JVNDB-2007-000526 // PACKETSTORM: 57697 // PACKETSTORM: 57713 // CNNVD: CNNVD-200707-265 // NVD: CVE-2007-2402

CREDITS

Jonathan 'Wolf' RentzschDavid VaartjesAdam Gowdiak※ zupa@man.poznan.pl

Trust: 0.6

sources: CNNVD: CNNVD-200707-265

SOURCES

db:CERT/CCid:VU#582681
db:VULHUBid:VHN-25764
db:BIDid:24873
db:JVNDBid:JVNDB-2007-000526
db:PACKETSTORMid:57697
db:PACKETSTORMid:57713
db:CNNVDid:CNNVD-200707-265
db:NVDid:CVE-2007-2402

LAST UPDATE DATE

2025-04-10T20:01:52.513000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#582681date:2007-07-13T00:00:00
db:VULHUBid:VHN-25764date:2018-10-30T00:00:00
db:BIDid:24873date:2007-09-05T18:21:00
db:JVNDBid:JVNDB-2007-000526date:2007-07-24T00:00:00
db:CNNVDid:CNNVD-200707-265date:2007-07-18T00:00:00
db:NVDid:CVE-2007-2402date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#582681date:2007-07-12T00:00:00
db:VULHUBid:VHN-25764date:2007-07-15T00:00:00
db:BIDid:24873date:2007-07-11T00:00:00
db:JVNDBid:JVNDB-2007-000526date:2007-07-24T00:00:00
db:PACKETSTORMid:57697date:2007-07-13T00:55:11
db:PACKETSTORMid:57713date:2007-07-13T01:43:24
db:CNNVDid:CNNVD-200707-265date:2007-07-15T00:00:00
db:NVDid:CVE-2007-2402date:2007-07-15T21:30:00