ID

VAR-201003-0206


CVE

CVE-2010-0526


TITLE

Apple Mac OS X of QuickTime Heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-001277

DESCRIPTION

Heap-based buffer overflow in QuickTimeMPEG.qtx in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted genl atom in a QuickTime movie file with MPEG encoding, which is not properly handled during decompression. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists during the parsing of MPEG content. Upon reading a field used for compression within a 'genl' atom in the movie container, the application will decompress outside the boundary of an allocated buffer. Successful exploitation can lead to code execution under the context of the application. A heap overflow is caused when QuickTime fails to perform proper bounds checking on the amount of data copied to the heap by a set of nested loops which can result in arbitrary code execution. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions. The following are vulnerable: Mac OS X 10.6 prior to 10.6.3 Mac OS X Server 10.6 prior to 10.6.3 QuickTime 7 prior to 7.6.6 on Mac OS X 10.5.8 and Microsoft Windows XP, Vista, and 7. NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. ZDI-10-045: Apple QuickTime MPEG-1 genl Atom Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-10-045 April 2, 2010 -- CVE ID: CVE-2010-0526 -- Affected Vendors: Apple -- Affected Products: Apple OS X -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 9629. -- Vendor Response: Apple states: http://support.apple.com/kb/HT4104 http://support.apple.com/kb/HT4077 -- Disclosure Timeline: 2009-11-06 - Vulnerability reported to vendor 2010-04-02 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 3.42

sources: NVD: CVE-2010-0526 // JVNDB: JVNDB-2010-001277 // ZDI: ZDI-10-045 // ZDI: ZDI-10-035 // BID: 39166 // VULHUB: VHN-43131 // PACKETSTORM: 87992 // PACKETSTORM: 88002

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:quicktimescope: - version: -

Trust: 1.4

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.6.6

Trust: 0.8

vendor:applemodel:quicktime playerscope:eqversion:7.6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.6.6

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.3

Trust: 0.3

sources: ZDI: ZDI-10-045 // ZDI: ZDI-10-035 // BID: 39166 // JVNDB: JVNDB-2010-001277 // CNNVD: CNNVD-201003-488 // NVD: CVE-2010-0526

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2010-0526
value: HIGH

Trust: 1.4

nvd@nist.gov: CVE-2010-0526
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0526
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201003-488
value: MEDIUM

Trust: 0.6

VULHUB: VHN-43131
value: MEDIUM

Trust: 0.1

ZDI: CVE-2010-0526
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.4

nvd@nist.gov: CVE-2010-0526
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2010-0526
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-43131
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-10-045 // ZDI: ZDI-10-035 // VULHUB: VHN-43131 // JVNDB: JVNDB-2010-001277 // CNNVD: CNNVD-201003-488 // NVD: CVE-2010-0526

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-43131 // JVNDB: JVNDB-2010-001277 // NVD: CVE-2010-0526

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 87992 // PACKETSTORM: 88002 // CNNVD: CNNVD-201003-488

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201003-488

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001277

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-43131

PATCH

title:HT4077url:http://support.apple.com/kb/HT4077

Trust: 1.5

title:HT4104url:http://support.apple.com/kb/HT4104

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077?viewlocale=ja_JP

Trust: 0.8

title:HT4104url:http://support.apple.com/kb/HT4104?viewlocale=ja_JP

Trust: 0.8

title: - url:http://support.apple.com/kb/HT4104http://support.apple.com/kb/HT4077

Trust: 0.7

sources: ZDI: ZDI-10-045 // ZDI: ZDI-10-035 // JVNDB: JVNDB-2010-001277

EXTERNAL IDS

db:NVDid:CVE-2010-0526

Trust: 4.4

db:ZDIid:ZDI-10-035

Trust: 2.2

db:ZDIid:ZDI-10-045

Trust: 1.9

db:JVNDBid:JVNDB-2010-001277

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-608

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-461

Trust: 0.7

db:CNNVDid:CNNVD-201003-488

Trust: 0.7

db:APPLEid:APPLE-SA-2010-03-30-1

Trust: 0.6

db:APPLEid:APPLE-SA-2010-03-29-1

Trust: 0.6

db:NSFOCUSid:14715

Trust: 0.6

db:BIDid:39166

Trust: 0.4

db:PACKETSTORMid:88002

Trust: 0.2

db:PACKETSTORMid:87992

Trust: 0.2

db:VULHUBid:VHN-43131

Trust: 0.1

sources: ZDI: ZDI-10-045 // ZDI: ZDI-10-035 // VULHUB: VHN-43131 // BID: 39166 // JVNDB: JVNDB-2010-001277 // PACKETSTORM: 87992 // PACKETSTORM: 88002 // CNNVD: CNNVD-201003-488 // NVD: CVE-2010-0526

REFERENCES

url:http://support.apple.com/kb/ht4077

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00002.html

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-10-035

Trust: 1.2

url:http://www.zerodayinitiative.com/advisories/zdi-10-045

Trust: 1.2

url:http://www.securityfocus.com/archive/1/510508/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/510530/100/0/threaded

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6927

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0526

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0526

Trust: 0.8

url:http://support.apple.com/kb/ht4104http://support.apple.com/kb/ht4077

Trust: 0.7

url:http://www.nsfocus.net/vulndb/14715

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:/archive/1/510508

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-10-035/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-0526

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://twitter.com/thezdi

Trust: 0.2

url:http://www.tippingpoint.com

Trust: 0.2

url:http://www.zerodayinitiative.com

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://support.apple.com/kb/ht4104

Trust: 0.1

sources: ZDI: ZDI-10-045 // ZDI: ZDI-10-035 // VULHUB: VHN-43131 // BID: 39166 // JVNDB: JVNDB-2010-001277 // PACKETSTORM: 87992 // PACKETSTORM: 88002 // CNNVD: CNNVD-201003-488 // NVD: CVE-2010-0526

CREDITS

Anonymous

Trust: 1.4

sources: ZDI: ZDI-10-045 // ZDI: ZDI-10-035

SOURCES

db:ZDIid:ZDI-10-045
db:ZDIid:ZDI-10-035
db:VULHUBid:VHN-43131
db:BIDid:39166
db:JVNDBid:JVNDB-2010-001277
db:PACKETSTORMid:87992
db:PACKETSTORMid:88002
db:CNNVDid:CNNVD-201003-488
db:NVDid:CVE-2010-0526

LAST UPDATE DATE

2025-04-11T21:56:48.744000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-10-045date:2010-04-02T00:00:00
db:ZDIid:ZDI-10-035date:2010-04-02T00:00:00
db:VULHUBid:VHN-43131date:2018-10-10T00:00:00
db:BIDid:39166date:2010-04-02T18:22:00
db:JVNDBid:JVNDB-2010-001277date:2010-04-16T00:00:00
db:CNNVDid:CNNVD-201003-488date:2010-03-31T00:00:00
db:NVDid:CVE-2010-0526date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-10-045date:2010-04-02T00:00:00
db:ZDIid:ZDI-10-035date:2010-04-02T00:00:00
db:VULHUBid:VHN-43131date:2010-03-30T00:00:00
db:BIDid:39166date:2010-03-29T00:00:00
db:JVNDBid:JVNDB-2010-001277date:2010-04-16T00:00:00
db:PACKETSTORMid:87992date:2010-04-03T01:40:26
db:PACKETSTORMid:88002date:2010-04-03T01:44:54
db:CNNVDid:CNNVD-201003-488date:2010-03-30T00:00:00
db:NVDid:CVE-2010-0526date:2010-03-30T18:30:01.343