ID

VAR-200801-0011


CVE

CVE-2008-0032


TITLE

Apple QuickTime In Macintosh Resource Memory corruption vulnerability in record handling

Trust: 0.8

sources: JVNDB: JVNDB-2008-001035

DESCRIPTION

Apple QuickTime before 7.4 allows remote attackers to execute arbitrary code via a movie file containing a Macintosh Resource record with a modified length value in the resource header, which triggers heap corruption. Apple QuickTime is prone to a memory-corruption vulnerability. An attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted movie file. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions. This issue affects versions prior to Apple QuickTime 7.4 running on Microsoft Windows Vista, Microsoft Windows XP SP2, and Mac OS X. iDefense Security Advisory 01.15.08 http://labs.idefense.com/intelligence/vulnerabilities/ Jan 15, 2008 I. BACKGROUND Quicktime is Apple's media player product, and is used to render video and other media. For more information visit the vendor's web site at the following URL. http://www.apple.com/quicktime/ II. The vulnerability specifically exists in the handling of Macintosh Resources embedded in QuickTime movies. When processing these records, a length value stored in the resource header is not properly validated. When a length value larger than the actual buffer size is supplied, potentially exploitable memory corruption occurs. III. IV. DETECTION iDefense Labs confirmed this vulnerability exists in QuickTime Player version 7.3.1. Previous versions are suspected to be vulnerable. V. WORKAROUND iDefense is currently unaware of any effective workaround for this issue. VI. VENDOR RESPONSE Apple has released QuickTime 7.4 which resolves this issue. More information is available via Apple's QuickTime Security Update page at the URL shown below. http://docs.info.apple.com/article.html?artnum=307301 VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-0032 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 09/13/2007 Initial vendor notification 09/13/2007 Initial vendor response 01/15/2008 Coordinated public disclosure IX. CREDIT This vulnerability was discovered by Jun Mao of VeriSign iDefense Labs. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2008 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . I. Description Apple QuickTime 7.4 resolves multiple vulnerabilities in the way different types of image and media files are handled. Note that Apple iTunes installs QuickTime, so any system with iTunes is vulnerable. Solution Upgrade QuickTime Upgrade to QuickTime 7.4. This and other updates for Mac OS X are available via Apple Update. Secure your web browser To help mitigate these and other vulnerabilities that can be exploited via a web browser, refer to Securing Your Web Browser. References * About the security content of the QuickTime 7.4 Update - <http://docs.info.apple.com/article.html?artnum=307301> * How to tell if Software Update for Windows is working correctly when no updates are available - <http://docs.info.apple.com/article.html?artnum=304263> * Apple - QuickTime - Download - <http://www.apple.com/quicktime/download/> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> _________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-016A.html> _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA08-016A Feedback VU#818697" in the subject. _________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. _________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History January 16, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBR45mevRFkHkM87XOAQLP6AgAj7J4sy83ZWEKfcDb2brgHptxAwqvArkZ HzV+5lGg1A86V4/MARlxXctWv5JH3e2knx5ZoMUN8napP9VEag2Ra68Zdh9lKu1S nfCRRwcIj38iakuv7xKrNt1AJHj3rHguzCjvWu8gHEJtlb15zqVr97Ci9LuNdLP3 W4hdsIxuzYQl7Ou5+j0Z9bhH1WWZRjmabsop+b0ApxeZI2F6mJn0rscRvxPQYBls ims6CP7YseK4+ElJHAMEJfW/6gPhwyedjgesd0jssYvhtYdufn4OCZvwL+p9QSlQ +E+UKcws4BHlEpg0dQhA13REQxwqqMgSWdm3NU8hbGdEJAJGH0cYNQ== =emKJ -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA28502 VERIFY ADVISORY: http://secunia.com/advisories/28502/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a vulnerable system. 3) An error in the parsing of malformed Image Descriptor (IDSC) atoms can be exploited to cause a heap corruption via a specially crafted movie file. 4) A boundary error exists within the processing of compressed PICT images and can be exploited to cause a buffer overflow. QuickTime 7.4 for Leopard: http://www.apple.com/support/downloads/quicktime74forleopard.html QuickTime 7.4 for Tiger: http://www.apple.com/support/downloads/quicktime74fortiger.html QuickTime 7.4 for Panther: http://www.apple.com/support/downloads/quicktime74forpanther.html QuickTime 7.4 for Windows: http://www.apple.com/support/downloads/quicktime74forwindows.html PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Joe Schottman of Virginia Tech 2) Jun Mao, VeriSign iDefense Labs. 3) Cody Pierce, TippingPoint DVLabs 4) The vendor credits Chris Ries, Carnegie Mellon University Computing Services ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307301 TippingPoint DVLabs: http://dvlabs.tippingpoint.com/advisory/TPTI-08-01 iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=642 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor

Trust: 2.25

sources: NVD: CVE-2008-0032 // JVNDB: JVNDB-2008-001035 // BID: 27301 // VULHUB: VHN-30157 // PACKETSTORM: 62673 // PACKETSTORM: 62716 // PACKETSTORM: 62685

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:lteversion:7.3

Trust: 1.8

vendor:applemodel:quicktimescope:eqversion:7.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.4

Trust: 0.3

sources: BID: 27301 // JVNDB: JVNDB-2008-001035 // CNNVD: CNNVD-200801-215 // NVD: CVE-2008-0032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0032
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-0032
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200801-215
value: MEDIUM

Trust: 0.6

VULHUB: VHN-30157
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-0032
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30157
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30157 // JVNDB: JVNDB-2008-001035 // CNNVD: CNNVD-200801-215 // NVD: CVE-2008-0032

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-30157 // JVNDB: JVNDB-2008-001035 // NVD: CVE-2008-0032

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 62673 // PACKETSTORM: 62716 // CNNVD: CNNVD-200801-215

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200801-215

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001035

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-30157

PATCH

title:QuickTime 7.4url:http://docs.info.apple.com/article.html?artnum=307301-en

Trust: 0.8

title:QuickTime 7.4url:http://docs.info.apple.com/article.html?artnum=307301-ja

Trust: 0.8

title:TA08-016Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-016a.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001035

EXTERNAL IDS

db:NVDid:CVE-2008-0032

Trust: 2.9

db:USCERTid:TA08-016A

Trust: 2.6

db:SECUNIAid:28502

Trust: 2.6

db:SECTRACKid:1019221

Trust: 2.5

db:BIDid:27301

Trust: 2.2

db:VUPENid:ADV-2008-0148

Trust: 1.7

db:USCERTid:SA08-016A

Trust: 0.8

db:XFid:39696

Trust: 0.8

db:JVNDBid:JVNDB-2008-001035

Trust: 0.8

db:CNNVDid:CNNVD-200801-215

Trust: 0.7

db:APPLEid:APPLE-SA-2008-01-15

Trust: 0.6

db:CERT/CCid:TA08-016A

Trust: 0.6

db:XFid:39695

Trust: 0.6

db:NSFOCUSid:11391

Trust: 0.6

db:BIDid:27298

Trust: 0.6

db:PACKETSTORMid:62673

Trust: 0.2

db:VULHUBid:VHN-30157

Trust: 0.1

db:PACKETSTORMid:62716

Trust: 0.1

db:PACKETSTORMid:62685

Trust: 0.1

sources: VULHUB: VHN-30157 // BID: 27301 // JVNDB: JVNDB-2008-001035 // PACKETSTORM: 62673 // PACKETSTORM: 62716 // PACKETSTORM: 62685 // CNNVD: CNNVD-200801-215 // NVD: CVE-2008-0032

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta08-016a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1019221

Trust: 2.5

url:http://secunia.com/advisories/28502

Trust: 2.5

url:http://www.securityfocus.com/bid/27301

Trust: 1.9

url:http://docs.info.apple.com/article.html?artnum=307301

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2008/jan/msg00001.html

Trust: 1.7

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=642

Trust: 1.5

url:http://www.frsirt.com/english/advisories/2008/0148

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/0148

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/39696

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0032

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/39696

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-016a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-016a

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0032

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-016a.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2008/20080117_135357.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/39695

Trust: 0.6

url:http://www.securityfocus.com/bid/27298

Trust: 0.6

url:http://www.nsfocus.net/vulndb/11391

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.4

url:http://www.apple.com/swupdates/

Trust: 0.3

url:/archive/1/486396

Trust: 0.3

url:http://cve.mitre.org/),

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0032

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304263>

Trust: 0.1

url:http://www.apple.com/quicktime/download/>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-016a.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=307301>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime74forleopard.html

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime74forwindows.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://dvlabs.tippingpoint.com/advisory/tpti-08-01

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/28502/

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime74fortiger.html

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime74forpanther.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-30157 // BID: 27301 // JVNDB: JVNDB-2008-001035 // PACKETSTORM: 62673 // PACKETSTORM: 62716 // PACKETSTORM: 62685 // CNNVD: CNNVD-200801-215 // NVD: CVE-2008-0032

CREDITS

Jun Mao

Trust: 0.6

sources: CNNVD: CNNVD-200801-215

SOURCES

db:VULHUBid:VHN-30157
db:BIDid:27301
db:JVNDBid:JVNDB-2008-001035
db:PACKETSTORMid:62673
db:PACKETSTORMid:62716
db:PACKETSTORMid:62685
db:CNNVDid:CNNVD-200801-215
db:NVDid:CVE-2008-0032

LAST UPDATE DATE

2025-04-10T22:57:06.804000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30157date:2017-08-08T00:00:00
db:BIDid:27301date:2008-01-16T00:38:00
db:JVNDBid:JVNDB-2008-001035date:2008-01-30T00:00:00
db:CNNVDid:CNNVD-200801-215date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0032date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-30157date:2008-01-16T00:00:00
db:BIDid:27301date:2008-01-15T00:00:00
db:JVNDBid:JVNDB-2008-001035date:2008-01-30T00:00:00
db:PACKETSTORMid:62673date:2008-01-16T05:38:32
db:PACKETSTORMid:62716date:2008-01-17T05:49:01
db:PACKETSTORMid:62685date:2008-01-17T04:45:41
db:CNNVDid:CNNVD-200801-215date:2008-01-15T00:00:00
db:NVDid:CVE-2008-0032date:2008-01-16T03:00:00