ID

VAR-200909-0323


CVE

CVE-2009-2799


TITLE

Apple QuickTime of H.264 Video file processing heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-002117

DESCRIPTION

Heap-based buffer overflow in Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie file. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists during the parsing of samples from a malformed MOV file utilizing the H.264 codec. While parsing data to render the stream, the application will mistrust a length that is used to initialize a heap chunk that was allocated in a header. If the length is larger than the size of the chunk allocated, then a memory corruption will occur leading to code execution under the context of the currently logged in user. These issues arise when the application handles specially crafted H.264, MPEG-4, and FlashPix video files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions. Versions prior to QuickTime 7.6.4 are vulnerable on Windows 7, Vista, XP, and Mac OS X platforms. Apple QuickTime is a very popular multimedia player. ZDI-09-063: Apple QuickTime H.264 Nal Unit Length Heap Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-063 September 10, 2009 -- CVE ID: CVE-2009-2799 -- Affected Vendors: Apple -- Affected Products: Apple Quicktime -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 8435. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT3859 -- Disclosure Timeline: 2009-07-28 - Vulnerability reported to vendor 2009-09-10 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous * Damian Put -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 2.7

sources: NVD: CVE-2009-2799 // JVNDB: JVNDB-2009-002117 // ZDI: ZDI-09-063 // BID: 36328 // VULHUB: VHN-40245 // PACKETSTORM: 81196

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:6.1.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.1.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:6.0.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:4.1.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 1.3

vendor:applemodel:quicktimescope:eqversion:6.5.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion: -

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1.70

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:quicktimescope:lteversion:7.6.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:6.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.6.4

Trust: 0.8

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1.70

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

sources: ZDI: ZDI-09-063 // BID: 36328 // JVNDB: JVNDB-2009-002117 // CNNVD: CNNVD-200909-185 // NVD: CVE-2009-2799

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2799
value: HIGH

Trust: 1.0

NVD: CVE-2009-2799
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200909-185
value: CRITICAL

Trust: 0.6

VULHUB: VHN-40245
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2799
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40245
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40245 // JVNDB: JVNDB-2009-002117 // CNNVD: CNNVD-200909-185 // NVD: CVE-2009-2799

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-40245 // JVNDB: JVNDB-2009-002117 // NVD: CVE-2009-2799

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 81196 // CNNVD: CNNVD-200909-185

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200909-185

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002117

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-40245

PATCH

title:HT3859url:http://support.apple.com/kb/HT3859

Trust: 1.5

title:HT3937url:http://support.apple.com/kb/HT3937

Trust: 0.8

title:HT3937url:http://support.apple.com/kb/HT3937?viewlocale=ja_JP

Trust: 0.8

title:HT3859url:http://support.apple.com/kb/HT3859?viewlocale=ja_JP

Trust: 0.8

sources: ZDI: ZDI-09-063 // JVNDB: JVNDB-2009-002117

EXTERNAL IDS

db:NVDid:CVE-2009-2799

Trust: 3.6

db:BIDid:36328

Trust: 2.8

db:VUPENid:ADV-2009-3184

Trust: 1.7

db:ZDIid:ZDI-09-063

Trust: 0.8

db:JVNDBid:JVNDB-2009-002117

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-500

Trust: 0.7

db:CNNVDid:CNNVD-200909-185

Trust: 0.7

db:APPLEid:APPLE-SA-2009-09-09-2

Trust: 0.6

db:APPLEid:APPLE-SA-2009-11-09-1

Trust: 0.6

db:PACKETSTORMid:81196

Trust: 0.2

db:VULHUBid:VHN-40245

Trust: 0.1

sources: ZDI: ZDI-09-063 // VULHUB: VHN-40245 // BID: 36328 // JVNDB: JVNDB-2009-002117 // PACKETSTORM: 81196 // CNNVD: CNNVD-200909-185 // NVD: CVE-2009-2799

REFERENCES

url:http://support.apple.com/kb/ht3859

Trust: 2.5

url:http://www.securityfocus.com/bid/36328

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2009/sep/msg00002.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2009/nov/msg00000.html

Trust: 1.7

url:http://support.apple.com/kb/ht3937

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/3184

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6405

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2799

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2799

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.3

url:/archive/1/506389

Trust: 0.3

url:/archive/1/506388

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2799

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-09-063

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

sources: ZDI: ZDI-09-063 // VULHUB: VHN-40245 // BID: 36328 // JVNDB: JVNDB-2009-002117 // PACKETSTORM: 81196 // CNNVD: CNNVD-200909-185 // NVD: CVE-2009-2799

CREDITS

AnonymousDamian Put

Trust: 0.7

sources: ZDI: ZDI-09-063

SOURCES

db:ZDIid:ZDI-09-063
db:VULHUBid:VHN-40245
db:BIDid:36328
db:JVNDBid:JVNDB-2009-002117
db:PACKETSTORMid:81196
db:CNNVDid:CNNVD-200909-185
db:NVDid:CVE-2009-2799

LAST UPDATE DATE

2025-04-10T19:52:12.063000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-09-063date:2009-09-10T00:00:00
db:VULHUBid:VHN-40245date:2018-10-30T00:00:00
db:BIDid:36328date:2009-11-10T15:26:00
db:JVNDBid:JVNDB-2009-002117date:2009-12-15T00:00:00
db:CNNVDid:CNNVD-200909-185date:2009-09-24T00:00:00
db:NVDid:CVE-2009-2799date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:ZDIid:ZDI-09-063date:2009-09-10T00:00:00
db:VULHUBid:VHN-40245date:2009-09-10T00:00:00
db:BIDid:36328date:2009-09-09T00:00:00
db:JVNDBid:JVNDB-2009-002117date:2009-10-20T00:00:00
db:PACKETSTORMid:81196date:2009-09-11T21:36:21
db:CNNVDid:CNNVD-200909-185date:2009-09-10T00:00:00
db:NVDid:CVE-2009-2799date:2009-09-10T21:30:01.280