ID

VAR-201003-0220


CVE

CVE-2010-0515


TITLE

Apple Mac OS X of QuickTime Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2010-001271

DESCRIPTION

QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file with H.264 encoding. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists during the parsing of samples from a malformed MOV file utilizing the H.264 codec. While parsing data to render the stream, the application will miscalculate a length that is used to initialize a heap chunk that was allocated in a header. If the length is larger than the size of the chunk allocated, then a memory corruption will occur which can lead to code execution under the context of the application. Apple QuickTime is prone to a remote code-execution vulnerability because it fails to sufficiently validate user-supplied data when viewing H.264 movie files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions. The following are vulnerable: Mac OS X 10.6 prior to 10.6.3 Mac OS X Server 10.6 prior to 10.6.3 QuickTime 7 prior to 7.6.6 on Mac OS X 10.5.8 and Microsoft Windows XP, Vista, and 7. NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. -- Vendor Response: Apple states: Fixed in QuickTime 7.6.6 http://support.apple.com/kb/HT4104 -- Disclosure Timeline: 2009-12-04 - Vulnerability reported to vendor 2010-11-09 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi

Trust: 2.7

sources: NVD: CVE-2010-0515 // JVNDB: JVNDB-2010-001271 // ZDI: ZDI-10-244 // BID: 39159 // VULHUB: VHN-43120 // PACKETSTORM: 95701

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.6.6

Trust: 0.8

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktime playerscope:eqversion:7.6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.6.6

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.3

Trust: 0.3

sources: ZDI: ZDI-10-244 // BID: 39159 // JVNDB: JVNDB-2010-001271 // CNNVD: CNNVD-201003-477 // NVD: CVE-2010-0515

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0515
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0515
value: MEDIUM

Trust: 0.8

ZDI: CVE-2010-0515
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201003-477
value: MEDIUM

Trust: 0.6

VULHUB: VHN-43120
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0515
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2010-0515
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-43120
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-10-244 // VULHUB: VHN-43120 // JVNDB: JVNDB-2010-001271 // CNNVD: CNNVD-201003-477 // NVD: CVE-2010-0515

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-43120 // JVNDB: JVNDB-2010-001271 // NVD: CVE-2010-0515

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 95701 // CNNVD: CNNVD-201003-477

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201003-477

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001271

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-43120

PATCH

title:HT4104url:http://support.apple.com/kb/HT4104

Trust: 1.5

title:HT4077url:http://support.apple.com/kb/HT4077

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077?viewlocale=ja_JP

Trust: 0.8

title:HT4104url:http://support.apple.com/kb/HT4104?viewlocale=ja_JP

Trust: 0.8

sources: ZDI: ZDI-10-244 // JVNDB: JVNDB-2010-001271

EXTERNAL IDS

db:NVDid:CVE-2010-0515

Trust: 3.6

db:ZDIid:ZDI-10-244

Trust: 1.1

db:JVNDBid:JVNDB-2010-001271

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-602

Trust: 0.7

db:CNNVDid:CNNVD-201003-477

Trust: 0.7

db:APPLEid:APPLE-SA-2010-03-30-1

Trust: 0.6

db:APPLEid:APPLE-SA-2010-03-29-1

Trust: 0.6

db:NSFOCUSid:14715

Trust: 0.6

db:BIDid:39159

Trust: 0.4

db:PACKETSTORMid:95701

Trust: 0.2

db:VULHUBid:VHN-43120

Trust: 0.1

sources: ZDI: ZDI-10-244 // VULHUB: VHN-43120 // BID: 39159 // JVNDB: JVNDB-2010-001271 // PACKETSTORM: 95701 // CNNVD: CNNVD-201003-477 // NVD: CVE-2010-0515

REFERENCES

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00002.html

Trust: 1.7

url:http://support.apple.com/kb/ht4077

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6783

Trust: 1.1

url:http://support.apple.com/kb/ht4104

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0515

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0515

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14715

Trust: 0.6

url:http://www.zerodayinitiative.com/advisories/zdi-10-244

Trust: 0.4

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0515

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

sources: ZDI: ZDI-10-244 // VULHUB: VHN-43120 // BID: 39159 // JVNDB: JVNDB-2010-001271 // PACKETSTORM: 95701 // CNNVD: CNNVD-201003-477 // NVD: CVE-2010-0515

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-10-244

SOURCES

db:ZDIid:ZDI-10-244
db:VULHUBid:VHN-43120
db:BIDid:39159
db:JVNDBid:JVNDB-2010-001271
db:PACKETSTORMid:95701
db:CNNVDid:CNNVD-201003-477
db:NVDid:CVE-2010-0515

LAST UPDATE DATE

2025-04-11T22:25:11.592000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-10-244date:2010-11-09T00:00:00
db:VULHUBid:VHN-43120date:2017-09-19T00:00:00
db:BIDid:39159date:2010-11-09T17:07:00
db:JVNDBid:JVNDB-2010-001271date:2010-04-15T00:00:00
db:CNNVDid:CNNVD-201003-477date:2010-03-31T00:00:00
db:NVDid:CVE-2010-0515date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-10-244date:2010-11-09T00:00:00
db:VULHUBid:VHN-43120date:2010-03-30T00:00:00
db:BIDid:39159date:2010-03-29T00:00:00
db:JVNDBid:JVNDB-2010-001271date:2010-04-15T00:00:00
db:PACKETSTORMid:95701date:2010-11-10T05:15:37
db:CNNVDid:CNNVD-201003-477date:2010-03-30T00:00:00
db:NVDid:CVE-2010-0515date:2010-03-30T18:30:01.017