ID

VAR-200806-0185


CVE

CVE-2008-1582


TITLE

Apple QuickTime "file: URL" arbitrary code execution

Trust: 0.8

sources: CERT/CC: VU#132419

DESCRIPTION

Unspecified vulnerability in Apple QuickTime before 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted AAC-encoded file that triggers memory corruption. These issues arise when the application handles specially crafted PICT image files, Indeo video content, movie files, 'file:' URIs, and AAC-encoded media. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user; failed exploits will cause denial-of-service conditions. Versions prior to QuickTime 7.5 are affected. NOTE: This BID is being retired; the following individual records have been created to better document the issues: 29649 Apple QuickTime 'PICT' Image 'PixData' Structures Handling Heap Overflow Vulnerability 29650 Apple QuickTime 'file:' URI File Execution Vulnerability 29654 Apple QuickTime 'AAC-encoded' Media Memory Corruption Vulnerability 29648 Apple QuickTime 'PICT' Image Buffer Overflow Vulnerability 29652 Apple QuickTime Indo Video Codec Buffer Overflow Vulnerability. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Apple QuickTime Multiple Vulnerabilities SECUNIA ADVISORY ID: SA29293 VERIFY ADVISORY: http://secunia.com/advisories/29293/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. 1) A boundary error when parsing packed scanlines from a PixData structure in a PICT file can be exploited to cause a heap-based buffer overflow via a specially crafted PICT file. 5) An error in the handling of "file:" URLs can be exploited to e.g. execute arbitrary programs when playing specially crafted QuickTIme content in QuickTime Player. SOLUTION: Update to version 7.5 (via Software Update or Apple Downloads. See vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: 1) Dyon Balding, Secunia Research 2) Independently discovered by: * Dave Soldera, NGS Software * Jens Alfke 3) Liam O Murchu, Symantec 4) An anonymous researcher, reported via ZDI 5) Independently discovered by: * Vinoo Thomas and Rahul Mohandas, McAfee Avert Labs * Petko D. (pdp) Petkov, GNUCITIZEN ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT1991 Secunia Research: http://secunia.com/secunia_research/2008-9/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA08-162C Apple Quicktime Updates for Multiple Vulnerabilities Original release date: June 10, 2008 Last revised: -- Source: US-CERT Systems Affected * Apple Mac OS X running versions of QuickTime prior to 7.5 * Microsoft Windows running versions of QuickTime prior to 7.5 Overview Apple QuickTime contains multiple vulnerabilities as described in the Apple Knowledgebase article HT1991. I. Apple QuickTime 7.5 addresses these vulnerabilities. Note that Apple iTunes for Windows installs QuickTime, so any system with iTunes may be vulnerable. II. For further information, please see Apple knowledgebase article HT1991 about the security content of QuickTime 7.5 III. Solution Upgrade QuickTime Upgrade to QuickTime 7.5. This and other updates for Mac OS X are available via Apple Update. Secure your web browser To help mitigate these and other vulnerabilities that can be exploited via a web browser, refer to Securing Your Web Browser. IV. References * About the security content of the QuickTime 7.5 Update - <http://support.apple.com/kb/HT1991> * How to tell if Software Update for Windows is working correctly when no updates are available - <http://docs.info.apple.com/article.html?artnum=304263> * Apple - QuickTime - Download - <http://www.apple.com/quicktime/download/> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * US-CERT Vulnerability Notes for QuickTime 7.5 - <http://www.kb.cert.org/vuls/byid?searchview&query=apple_quicktime_7.5> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-162C.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA08-162C Feedback VU#132419" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2008 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History June 10, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSE7bhHIHljM+H4irAQKGtQf/bW1M/gN6V35MDqIGFK3PbaIXBqnhtFws xPl6zNdWmYVCHid6u0aZ+UYE+AESK3Qw3DdiwLRr3X9R4hoGmRUGiedv4h0owQTb Rij3K5simf2vbNBsVopFNeVnokOowkcRYUk/n0QnGn5FUnwDeKutrMwXQ94As/Y3 8z/VsKpwqjScHgedT6Hv67f8E6kSma4BBcK2NlRC9VMTWN2oUD7MDI/BSp5kcqaM TJfBJzqsWUywWRP3Bi8PYOLYbmC5Qj7nirl0lzCjJdNiS/GKUnT4LezHTlVhVOv5 FTnkO25morpDQph2+oBi6o+lCOBu6G6RtfQ7u15CGDCeZyme2B79eg== =e01A -----END PGP SIGNATURE-----

Trust: 3.15

sources: NVD: CVE-2008-1582 // CERT/CC: VU#132419 // JVNDB: JVNDB-2008-001436 // BID: 29619 // BID: 29654 // VULHUB: VHN-31707 // PACKETSTORM: 67149 // PACKETSTORM: 67176

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.6

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.5

Trust: 0.8

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:neversion:7.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.3.1.70

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

sources: CERT/CC: VU#132419 // BID: 29619 // BID: 29654 // JVNDB: JVNDB-2008-001436 // CNNVD: CNNVD-200806-142 // NVD: CVE-2008-1582

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1582
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#132419
value: 18.25

Trust: 0.8

NVD: CVE-2008-1582
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200806-142
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31707
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1582
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31707
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#132419 // VULHUB: VHN-31707 // JVNDB: JVNDB-2008-001436 // CNNVD: CNNVD-200806-142 // NVD: CVE-2008-1582

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-31707 // JVNDB: JVNDB-2008-001436 // NVD: CVE-2008-1582

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 67176 // CNNVD: CNNVD-200806-142

TYPE

Unknown

Trust: 0.6

sources: BID: 29619 // BID: 29654

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001436

PATCH

title:QuickTime 7.5url:http://support.apple.com/kb/HT1991

Trust: 0.8

title:QuickTime 7.5url:http://support.apple.com/kb/HT1991?locale=ja_JP

Trust: 0.8

title:TA08-162Curl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-162c.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001436

EXTERNAL IDS

db:NVDid:CVE-2008-1582

Trust: 3.1

db:BIDid:29654

Trust: 2.8

db:BIDid:29619

Trust: 2.8

db:USCERTid:TA08-162C

Trust: 2.6

db:SECUNIAid:29293

Trust: 2.6

db:SECTRACKid:1020214

Trust: 2.5

db:VUPENid:ADV-2008-1776

Trust: 1.7

db:XFid:42944

Trust: 1.4

db:CERT/CCid:VU#132419

Trust: 1.1

db:USCERTid:SA08-162C

Trust: 0.8

db:JVNDBid:JVNDB-2008-001436

Trust: 0.8

db:CNNVDid:CNNVD-200806-142

Trust: 0.7

db:CERT/CCid:TA08-162C

Trust: 0.6

db:APPLEid:APPLE-SA-2008-06-09

Trust: 0.6

db:ZDIid:ZDI-08-038

Trust: 0.3

db:ZDIid:ZDI-08-037

Trust: 0.3

db:VULHUBid:VHN-31707

Trust: 0.1

db:PACKETSTORMid:67149

Trust: 0.1

db:PACKETSTORMid:67176

Trust: 0.1

sources: CERT/CC: VU#132419 // VULHUB: VHN-31707 // BID: 29619 // BID: 29654 // JVNDB: JVNDB-2008-001436 // PACKETSTORM: 67149 // PACKETSTORM: 67176 // CNNVD: CNNVD-200806-142 // NVD: CVE-2008-1582

REFERENCES

url:http://www.securityfocus.com/bid/29619

Trust: 2.5

url:http://www.securityfocus.com/bid/29654

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-162c.html

Trust: 2.5

url:http://secunia.com/advisories/29293

Trust: 2.5

url:http://support.apple.com/kb/ht1991

Trust: 2.4

url:http://lists.apple.com/archives/security-announce/2008/jun/msg00000.html

Trust: 1.7

url:http://www.securitytracker.com/id?1020214

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/1776/references

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/42944

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/1776/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42944

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1582

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-162c/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-162c/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1582

Trust: 0.8

url:http://securitytracker.com/alerts/2008/jun/1020214.html

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-162c.html

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.6

url:/archive/1/493225

Trust: 0.3

url:/archive/1/493247

Trust: 0.3

url:/archive/1/493248

Trust: 0.3

url:http://secunia.com/secunia_research/2008-9/advisory/

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/132419

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-037

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-08-038

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://secunia.com/secunia_research/2008-9/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/29293/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304263>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple_quicktime_7.5>

Trust: 0.1

url:http://www.apple.com/quicktime/download/>

Trust: 0.1

url:http://support.apple.com/kb/ht1991>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-162c.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

sources: CERT/CC: VU#132419 // VULHUB: VHN-31707 // BID: 29619 // BID: 29654 // JVNDB: JVNDB-2008-001436 // PACKETSTORM: 67149 // PACKETSTORM: 67176 // CNNVD: CNNVD-200806-142 // NVD: CVE-2008-1582

CREDITS

Dyon BaldingDave SolderaRahul Mohandas

Trust: 0.6

sources: CNNVD: CNNVD-200806-142

SOURCES

db:CERT/CCid:VU#132419
db:VULHUBid:VHN-31707
db:BIDid:29619
db:BIDid:29654
db:JVNDBid:JVNDB-2008-001436
db:PACKETSTORMid:67149
db:PACKETSTORMid:67176
db:CNNVDid:CNNVD-200806-142
db:NVDid:CVE-2008-1582

LAST UPDATE DATE

2025-04-10T22:57:06.167000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#132419date:2008-06-10T00:00:00
db:VULHUBid:VHN-31707date:2017-08-08T00:00:00
db:BIDid:29619date:2008-06-11T17:22:00
db:BIDid:29654date:2008-06-11T20:22:00
db:JVNDBid:JVNDB-2008-001436date:2008-07-03T00:00:00
db:CNNVDid:CNNVD-200806-142date:2008-09-11T00:00:00
db:NVDid:CVE-2008-1582date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#132419date:2008-06-10T00:00:00
db:VULHUBid:VHN-31707date:2008-06-10T00:00:00
db:BIDid:29619date:2008-06-10T00:00:00
db:BIDid:29654date:2008-06-09T00:00:00
db:JVNDBid:JVNDB-2008-001436date:2008-07-03T00:00:00
db:PACKETSTORMid:67149date:2008-06-11T00:36:08
db:PACKETSTORMid:67176date:2008-06-11T03:00:24
db:CNNVDid:CNNVD-200806-142date:2008-06-10T00:00:00
db:NVDid:CVE-2008-1582date:2008-06-10T18:32:00