ID

VAR-201003-0224


CVE

CVE-2010-0519


TITLE

Apple Mac OS X of QuickTime Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-001275

DESCRIPTION

Integer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a FlashPix image with a malformed SubImage Header Stream containing a NumberOfTiles field with a large value. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists during the parsing of a malformed SubImage Header Stream from a malicious FlashPix image. The application takes the NumberOfTiles field from this data structure, multiplies it by 16, and then uses it in an allocation. If this result is larger than 32-bits the value will wrap leading to an under-allocated buffer. Later when the application copies data into this buffer, a buffer overflow will occur leading to code execution within the context of the application. Apple QuickTime is prone to an integer-overflow vulnerability when parsing FlashPix encoded files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions. The following are vulnerable: Mac OS X 10.6 prior to 10.6.3 Mac OS X Server 10.6 prior to 10.6.3 QuickTime 7 prior to 7.6.6 on Mac OS X 10.5.8 and Microsoft Windows XP, Vista, and 7. NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. An integer overflow vulnerability exists in the handling of FlashPix-encoded movie files in QuickTime versions prior to Apple Mac OS 10.6.3. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT4104 -- Disclosure Timeline: 2009-10-27 - Vulnerability reported to vendor 2010-04-02 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.7

sources: NVD: CVE-2010-0519 // JVNDB: JVNDB-2010-001275 // ZDI: ZDI-10-043 // BID: 39155 // VULHUB: VHN-43124 // PACKETSTORM: 88000

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.6.6

Trust: 0.8

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktime playerscope:eqversion:7.6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.6.6

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.3

Trust: 0.3

sources: ZDI: ZDI-10-043 // BID: 39155 // JVNDB: JVNDB-2010-001275 // CNNVD: CNNVD-201003-481 // NVD: CVE-2010-0519

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0519
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0519
value: MEDIUM

Trust: 0.8

ZDI: CVE-2010-0519
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201003-481
value: MEDIUM

Trust: 0.6

VULHUB: VHN-43124
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0519
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2010-0519
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-43124
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-10-043 // VULHUB: VHN-43124 // JVNDB: JVNDB-2010-001275 // CNNVD: CNNVD-201003-481 // NVD: CVE-2010-0519

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-43124 // JVNDB: JVNDB-2010-001275 // NVD: CVE-2010-0519

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 93464 // PACKETSTORM: 88000 // CNNVD: CNNVD-201003-481

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201003-481

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001275

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-43124

PATCH

title:HT4104url:http://support.apple.com/kb/HT4104

Trust: 1.5

title:HT4077url:http://support.apple.com/kb/HT4077

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077?viewlocale=ja_JP

Trust: 0.8

title:HT4104url:http://support.apple.com/kb/HT4104?viewlocale=ja_JP

Trust: 0.8

sources: ZDI: ZDI-10-043 // JVNDB: JVNDB-2010-001275

EXTERNAL IDS

db:NVDid:CVE-2010-0519

Trust: 3.7

db:ZDIid:ZDI-10-043

Trust: 2.2

db:JVNDBid:JVNDB-2010-001275

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-597

Trust: 0.7

db:CNNVDid:CNNVD-201003-481

Trust: 0.7

db:APPLEid:APPLE-SA-2010-03-30-1

Trust: 0.6

db:APPLEid:APPLE-SA-2010-03-29-1

Trust: 0.6

db:NSFOCUSid:14715

Trust: 0.6

db:BIDid:39155

Trust: 0.4

db:PACKETSTORMid:88000

Trust: 0.2

db:PACKETSTORMid:93464

Trust: 0.2

db:PACKETSTORMid:93454

Trust: 0.1

db:SEEBUGid:SSVID-69757

Trust: 0.1

db:EXPLOIT-DBid:14869

Trust: 0.1

db:VULHUBid:VHN-43124

Trust: 0.1

sources: ZDI: ZDI-10-043 // VULHUB: VHN-43124 // BID: 39155 // JVNDB: JVNDB-2010-001275 // PACKETSTORM: 93464 // PACKETSTORM: 88000 // CNNVD: CNNVD-201003-481 // NVD: CVE-2010-0519

REFERENCES

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00002.html

Trust: 1.7

url:http://support.apple.com/kb/ht4077

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-10-043

Trust: 1.2

url:http://www.securityfocus.com/archive/1/510519/100/0/threaded

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7498

Trust: 1.1

url:http://support.apple.com/kb/ht4104

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0519

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0519

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14715

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:/archive/1/510478

Trust: 0.3

url:/archive/1/510519

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-10-043/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-0519

Trust: 0.2

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

sources: ZDI: ZDI-10-043 // VULHUB: VHN-43124 // BID: 39155 // JVNDB: JVNDB-2010-001275 // PACKETSTORM: 93464 // PACKETSTORM: 88000 // CNNVD: CNNVD-201003-481 // NVD: CVE-2010-0519

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-10-043

SOURCES

db:ZDIid:ZDI-10-043
db:VULHUBid:VHN-43124
db:BIDid:39155
db:JVNDBid:JVNDB-2010-001275
db:PACKETSTORMid:93464
db:PACKETSTORMid:88000
db:CNNVDid:CNNVD-201003-481
db:NVDid:CVE-2010-0519

LAST UPDATE DATE

2025-04-11T22:34:12.293000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-10-043date:2010-04-02T00:00:00
db:VULHUBid:VHN-43124date:2018-10-10T00:00:00
db:BIDid:39155date:2010-09-02T13:12:00
db:JVNDBid:JVNDB-2010-001275date:2010-04-16T00:00:00
db:CNNVDid:CNNVD-201003-481date:2010-03-31T00:00:00
db:NVDid:CVE-2010-0519date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-10-043date:2010-04-02T00:00:00
db:VULHUBid:VHN-43124date:2010-03-30T00:00:00
db:BIDid:39155date:2010-03-29T00:00:00
db:JVNDBid:JVNDB-2010-001275date:2010-04-16T00:00:00
db:PACKETSTORMid:93464date:2010-09-03T03:37:47
db:PACKETSTORMid:88000date:2010-04-03T01:43:59
db:CNNVDid:CNNVD-201003-481date:2010-03-30T00:00:00
db:NVDid:CVE-2010-0519date:2010-03-30T18:30:01.140