ID

VAR-200906-0063


CVE

CVE-2009-0954


TITLE

Apple QuickTime In CRGN Buffer overflow vulnerability in atom type processing

Trust: 0.8

sources: JVNDB: JVNDB-2009-001724

DESCRIPTION

Heap-based buffer overflow in Apple QuickTime before 7.6.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a movie file containing crafted Clipping Region (CRGN) atom types. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of QuickTime Player. The application trusts the contents of the atom to contain a terminator during a copy operation. The application will copy user-supplied data into a heap-buffer until it identifies this terminator. This will allow one to overwrite heap-control structures which can be leveraged to achieve code execution from the context of the application. Apple QuickTime is prone to a heap-based buffer-overflow vulnerability. A remote attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted file. Failed exploit attempts likely result in denial-of-service conditions. This issue affects Apple QuickTime running on Microsoft Windows Vista and Windows XP SP3. Versions of QuickTime prior to 7.6.2 have multiple security vulnerabilities that allow users to cause a denial of service or completely compromise a user's system through malformed media files. ZDI-09-028: Apple QuickTime CRGN Atom Parsing Heap Buffer Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-028 June 2, 2009 -- CVE ID: CVE-2009-0954 -- Affected Vendors: Apple -- Affected Products: Apple Quicktime -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 6698. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT3591 -- Disclosure Timeline: 2008-12-17 - Vulnerability reported to vendor 2009-06-02 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous * Damian Put -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ . ---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Apple QuickTime PICT Parsing Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA35091 VERIFY ADVISORY: http://secunia.com/advisories/35091/ DESCRIPTION: A vulnerability has been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system The vulnerability is caused due to an error in the processing of "0x77" tags within PICT images, which can be exploited to cause a heap-based buffer overflow when the user opens a specially crafted PICT image or visits a malicious web site. This is related to vulnerability #30 in: SA35074 SOLUTION: Do not browse untrusted web sites. Do not open files from untrusted sources. PROVIDED AND/OR DISCOVERED BY: Damian Put and Sebastian Apelt, reported via ZDI. ORIGINAL ADVISORY: http://www.zerodayinitiative.com/advisories/ZDI-09-021/ OTHER REFERENCES: SA35074: http://secunia.com/advisories/35074/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.42

sources: NVD: CVE-2009-0954 // JVNDB: JVNDB-2009-001724 // ZDI: ZDI-09-028 // ZDI: ZDI-09-084 // BID: 35167 // VULHUB: VHN-38400 // PACKETSTORM: 78023 // PACKETSTORM: 77746

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.6.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.5.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.4.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.5.5

Trust: 1.6

vendor:applemodel:quicktimescope: - version: -

Trust: 1.4

vendor:applemodel:quicktimescope:eqversion:6.5.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion: -

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:4.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1.70

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:lteversion:7.6.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1.0

Trust: 1.0

vendor:applemodel:quicktimescope:ltversion:7.6.2

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.6.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1.70

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

sources: ZDI: ZDI-09-028 // ZDI: ZDI-09-084 // BID: 35167 // JVNDB: JVNDB-2009-001724 // CNNVD: CNNVD-200906-030 // NVD: CVE-2009-0954

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0954
value: HIGH

Trust: 1.0

NVD: CVE-2009-0954
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200906-030
value: CRITICAL

Trust: 0.6

VULHUB: VHN-38400
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-0954
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-38400
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38400 // JVNDB: JVNDB-2009-001724 // CNNVD: CNNVD-200906-030 // NVD: CVE-2009-0954

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-38400 // JVNDB: JVNDB-2009-001724 // NVD: CVE-2009-0954

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200906-030

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200906-030

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001724

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-38400

PATCH

title:HT3591url:http://support.apple.com/kb/HT3591

Trust: 2.2

title:HT3591url:http://support.apple.com/kb/HT3591?viewlocale=ja_JP

Trust: 0.8

sources: ZDI: ZDI-09-028 // ZDI: ZDI-09-084 // JVNDB: JVNDB-2009-001724

EXTERNAL IDS

db:NVDid:CVE-2009-0954

Trust: 4.3

db:BIDid:35167

Trust: 2.8

db:SECUNIAid:35091

Trust: 2.7

db:VUPENid:ADV-2009-1469

Trust: 2.5

db:SECTRACKid:1022314

Trust: 2.5

db:OSVDBid:54875

Trust: 2.5

db:XFid:50892

Trust: 1.4

db:ZDIid:ZDI-09-028

Trust: 1.1

db:JVNDBid:JVNDB-2009-001724

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-414

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-481

Trust: 0.7

db:ZDIid:ZDI-09-084

Trust: 0.7

db:APPLEid:APPLE-SA-2009-06-01-1

Trust: 0.6

db:CNNVDid:CNNVD-200906-030

Trust: 0.6

db:PACKETSTORMid:78023

Trust: 0.2

db:VULHUBid:VHN-38400

Trust: 0.1

db:ZDIid:ZDI-09-021

Trust: 0.1

db:PACKETSTORMid:77746

Trust: 0.1

sources: ZDI: ZDI-09-028 // ZDI: ZDI-09-084 // VULHUB: VHN-38400 // BID: 35167 // JVNDB: JVNDB-2009-001724 // PACKETSTORM: 78023 // PACKETSTORM: 77746 // CNNVD: CNNVD-200906-030 // NVD: CVE-2009-0954

REFERENCES

url:http://support.apple.com/kb/ht3591

Trust: 3.5

url:http://www.securityfocus.com/bid/35167

Trust: 2.5

url:http://osvdb.org/54875

Trust: 2.5

url:http://www.securitytracker.com/id?1022314

Trust: 2.5

url:http://secunia.com/advisories/35091

Trust: 2.5

url:http://www.vupen.com/english/advisories/2009/1469

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00000.html

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/50892

Trust: 1.4

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15344

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50892

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0954

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0954

Trust: 0.8

url:http://www.zerodayinitiative.com/advisories/zdi-09-028

Trust: 0.4

url:http://www.apple.com/quicktime/

Trust: 0.3

url:/archive/1/504026

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0954

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-09-021/

Trust: 0.1

url:http://secunia.com/advisories/35074/

Trust: 0.1

url:http://secunia.com/advisories/35091/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: ZDI: ZDI-09-028 // ZDI: ZDI-09-084 // VULHUB: VHN-38400 // BID: 35167 // JVNDB: JVNDB-2009-001724 // PACKETSTORM: 78023 // PACKETSTORM: 77746 // CNNVD: CNNVD-200906-030 // NVD: CVE-2009-0954

CREDITS

AnonymousDamian Put

Trust: 0.7

sources: ZDI: ZDI-09-028

SOURCES

db:ZDIid:ZDI-09-028
db:ZDIid:ZDI-09-084
db:VULHUBid:VHN-38400
db:BIDid:35167
db:JVNDBid:JVNDB-2009-001724
db:PACKETSTORMid:78023
db:PACKETSTORMid:77746
db:CNNVDid:CNNVD-200906-030
db:NVDid:CVE-2009-0954

LAST UPDATE DATE

2025-04-10T21:38:23.915000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-09-028date:2009-06-02T00:00:00
db:ZDIid:ZDI-09-084date:2009-06-02T00:00:00
db:VULHUBid:VHN-38400date:2018-10-30T00:00:00
db:BIDid:35167date:2009-06-02T19:19:00
db:JVNDBid:JVNDB-2009-001724date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200906-030date:2009-06-09T00:00:00
db:NVDid:CVE-2009-0954date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:ZDIid:ZDI-09-028date:2009-06-02T00:00:00
db:ZDIid:ZDI-09-084date:2009-06-02T00:00:00
db:VULHUBid:VHN-38400date:2009-06-02T00:00:00
db:BIDid:35167date:2009-06-01T00:00:00
db:JVNDBid:JVNDB-2009-001724date:2009-07-08T00:00:00
db:PACKETSTORMid:78023date:2009-06-03T03:52:30
db:PACKETSTORMid:77746date:2009-05-24T05:47:04
db:CNNVDid:CNNVD-200906-030date:2009-06-02T00:00:00
db:NVDid:CVE-2009-0954date:2009-06-02T18:30:00.360