ID

VAR-200909-0322


CVE

CVE-2009-2798


TITLE

Apple QuickTime of FlashPix Heap-based buffer overflow vulnerability in file handling

Trust: 0.8

sources: JVNDB: JVNDB-2009-002116

DESCRIPTION

Heap-based buffer overflow in Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted FlashPix file. Apple QuickTime Is FlashPix Arbitrary code is executed or service operation is interrupted due to incomplete processing (DoS) There is a vulnerability that becomes a condition.Arbitrary code is executed by a third party or service operation is interrupted (DoS) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists during the parsing of malformed FlashPix (.fpx) files. While parsing the SectorShift and cSectFat fields from the header, the application will multiply 2 user-controlled 32-bit values and utilize this for an allocation. If the result of the multiplication is greater than 32bits, the application will allocate an undersized heap chunk. These issues arise when the application handles specially crafted H.264, MPEG-4, and FlashPix video files. Versions prior to QuickTime 7.6.4 are vulnerable on Windows 7, Vista, XP, and Mac OS X platforms. Apple QuickTime is a very popular multimedia player. ZDI-09-064: Apple QuickTime FlashPix Sector Size Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-064 September 10, 2009 -- CVE ID: CVE-2009-2798 -- Affected Vendors: Apple -- Affected Products: Apple Quicktime -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 8414. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT3859 -- Disclosure Timeline: 2009-07-28 - Vulnerability reported to vendor 2009-09-10 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Damian Put -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 2.7

sources: NVD: CVE-2009-2798 // JVNDB: JVNDB-2009-002116 // ZDI: ZDI-09-064 // BID: 36328 // VULHUB: VHN-40244 // PACKETSTORM: 81197

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.2.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.2.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 1.3

vendor:applemodel:quicktimescope:eqversion:6.5.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion: -

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:4.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1.70

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:quicktimescope:lteversion:7.6.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.6.4

Trust: 0.8

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1.70

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

sources: ZDI: ZDI-09-064 // BID: 36328 // JVNDB: JVNDB-2009-002116 // CNNVD: CNNVD-200909-184 // NVD: CVE-2009-2798

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2798
value: HIGH

Trust: 1.0

NVD: CVE-2009-2798
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200909-184
value: CRITICAL

Trust: 0.6

VULHUB: VHN-40244
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2798
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40244
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40244 // JVNDB: JVNDB-2009-002116 // CNNVD: CNNVD-200909-184 // NVD: CVE-2009-2798

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-40244 // JVNDB: JVNDB-2009-002116 // NVD: CVE-2009-2798

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 81197 // CNNVD: CNNVD-200909-184

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200909-184

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002116

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-40244

PATCH

title:HT3859url:http://support.apple.com/kb/HT3859

Trust: 1.5

title:HT3937url:http://support.apple.com/kb/HT3937

Trust: 0.8

title:HT3937url:http://support.apple.com/kb/HT3937?viewlocale=ja_JP

Trust: 0.8

title:HT3859url:http://support.apple.com/kb/HT3859?viewlocale=ja_JP

Trust: 0.8

sources: ZDI: ZDI-09-064 // JVNDB: JVNDB-2009-002116

EXTERNAL IDS

db:NVDid:CVE-2009-2798

Trust: 3.6

db:BIDid:36328

Trust: 2.8

db:VUPENid:ADV-2009-3184

Trust: 1.7

db:ZDIid:ZDI-09-064

Trust: 0.8

db:JVNDBid:JVNDB-2009-002116

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-524

Trust: 0.7

db:CNNVDid:CNNVD-200909-184

Trust: 0.7

db:APPLEid:APPLE-SA-2009-09-09-2

Trust: 0.6

db:APPLEid:APPLE-SA-2009-11-09-1

Trust: 0.6

db:PACKETSTORMid:81197

Trust: 0.2

db:VULHUBid:VHN-40244

Trust: 0.1

sources: ZDI: ZDI-09-064 // VULHUB: VHN-40244 // BID: 36328 // JVNDB: JVNDB-2009-002116 // PACKETSTORM: 81197 // CNNVD: CNNVD-200909-184 // NVD: CVE-2009-2798

REFERENCES

url:http://support.apple.com/kb/ht3859

Trust: 2.5

url:http://www.securityfocus.com/bid/36328

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2009/sep/msg00002.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2009/nov/msg00000.html

Trust: 1.7

url:http://support.apple.com/kb/ht3937

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/3184

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6258

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2798

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2798

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.3

url:/archive/1/506389

Trust: 0.3

url:/archive/1/506388

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-09-064

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2798

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

sources: ZDI: ZDI-09-064 // VULHUB: VHN-40244 // BID: 36328 // JVNDB: JVNDB-2009-002116 // PACKETSTORM: 81197 // CNNVD: CNNVD-200909-184 // NVD: CVE-2009-2798

CREDITS

Damian Put

Trust: 0.7

sources: ZDI: ZDI-09-064

SOURCES

db:ZDIid:ZDI-09-064
db:VULHUBid:VHN-40244
db:BIDid:36328
db:JVNDBid:JVNDB-2009-002116
db:PACKETSTORMid:81197
db:CNNVDid:CNNVD-200909-184
db:NVDid:CVE-2009-2798

LAST UPDATE DATE

2025-04-10T21:48:52.933000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-09-064date:2009-09-10T00:00:00
db:VULHUBid:VHN-40244date:2018-10-30T00:00:00
db:BIDid:36328date:2009-11-10T15:26:00
db:JVNDBid:JVNDB-2009-002116date:2009-12-17T00:00:00
db:CNNVDid:CNNVD-200909-184date:2009-09-24T00:00:00
db:NVDid:CVE-2009-2798date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:ZDIid:ZDI-09-064date:2009-09-10T00:00:00
db:VULHUBid:VHN-40244date:2009-09-10T00:00:00
db:BIDid:36328date:2009-09-09T00:00:00
db:JVNDBid:JVNDB-2009-002116date:2009-10-20T00:00:00
db:PACKETSTORMid:81197date:2009-09-11T21:36:44
db:CNNVDid:CNNVD-200909-184date:2009-09-10T00:00:00
db:NVDid:CVE-2009-2798date:2009-09-10T21:30:01.267