ID

VAR-201011-0155


CVE

CVE-2010-3787


TITLE

Apple QuickTime JPEG2000 heap buffer overflow

Trust: 0.8

sources: CERT/CC: VU#309873

DESCRIPTION

Heap-based buffer overflow in QuickTime in Apple Mac OS X 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JP2 image. Apple QuickTime is prone to a remote heap-based buffer-overflow vulnerability. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions. NOTE: This issue was previously covered in BID 44778 (Apple Mac OS X Prior to 10.6.5 Multiple Security Vulnerabilities), but has been given its own record to better document it. Apple QuickTime is a very popular multimedia player

Trust: 2.7

sources: NVD: CVE-2010-3787 // CERT/CC: VU#309873 // JVNDB: JVNDB-2010-002431 // BID: 44798 // VULHUB: VHN-46392

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.6.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:applemodel:quicktimescope:ltversion:7.6.9

Trust: 0.8

vendor:applemodel:quicktime playerscope:eqversion:7.6.8

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.7

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.6(1671)

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.64.17.73

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.6.9

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.5

Trust: 0.3

sources: CERT/CC: VU#309873 // BID: 44798 // JVNDB: JVNDB-2010-002431 // CNNVD: CNNVD-201011-173 // NVD: CVE-2010-3787

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-3787
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#309873
value: HIGH

Trust: 0.8

NVD: CVE-2010-3787
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201011-173
value: MEDIUM

Trust: 0.6

VULHUB: VHN-46392
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-3787
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CARNEGIE MELLON: VU#309873
severity: HIGH
baseScore: 9.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-46392
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#309873 // VULHUB: VHN-46392 // JVNDB: JVNDB-2010-002431 // CNNVD: CNNVD-201011-173 // NVD: CVE-2010-3787

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-46392 // JVNDB: JVNDB-2010-002431 // NVD: CVE-2010-3787

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201011-173

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201011-173

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002431

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#309873

PATCH

title:HT4435url:http://support.apple.com/kb/HT4435

Trust: 0.8

title:HT4447url:http://support.apple.com/kb/HT4447

Trust: 0.8

title:HT4435url:http://support.apple.com/kb/HT4435?viewlocale=ja_JP

Trust: 0.8

title:HT4447url:http://support.apple.com/kb/HT4447?viewlocale=ja_JP

Trust: 0.8

title:QuickTimeInstallerurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=35225

Trust: 0.6

title:MacOSXUpdCombo10.6.5url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=35034

Trust: 0.6

title:MacOSXUpd10.6.5url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=35033

Trust: 0.6

sources: JVNDB: JVNDB-2010-002431 // CNNVD: CNNVD-201011-173

EXTERNAL IDS

db:CERT/CCid:VU#309873

Trust: 3.0

db:NVDid:CVE-2010-3787

Trust: 2.8

db:BIDid:44798

Trust: 1.4

db:SECTRACKid:1024729

Trust: 1.1

db:JVNDBid:JVNDB-2010-002431

Trust: 0.8

db:CNNVDid:CNNVD-201011-173

Trust: 0.7

db:APPLEid:APPLE-SA-2010-11-10-1

Trust: 0.6

db:VULHUBid:VHN-46392

Trust: 0.1

sources: CERT/CC: VU#309873 // VULHUB: VHN-46392 // BID: 44798 // JVNDB: JVNDB-2010-002431 // CNNVD: CNNVD-201011-173 // NVD: CVE-2010-3787

REFERENCES

url:http://support.apple.com/kb/ht4435

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/309873

Trust: 2.2

url:http://support.apple.com/kb/ht4447

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html

Trust: 1.7

url:http://support.microsoft.com/kb/240797

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//dec/msg00000.html

Trust: 1.1

url:http://www.securityfocus.com/bid/44798

Trust: 1.1

url:http://www.securitytracker.com/id?1024729

Trust: 1.1

url:http://plugindoc.mozdev.org/faqs/uninstall.html

Trust: 0.8

url:http://www.apple.com/support/security/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3787

Trust: 0.8

url:http://jvn.jp/cert/jvnvu387412

Trust: 0.8

url:http://jvn.jp/cert/jvnvu331391

Trust: 0.8

url:http://jvn.jp/cert/jvnvu309873

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-3787

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.3

sources: CERT/CC: VU#309873 // VULHUB: VHN-46392 // BID: 44798 // JVNDB: JVNDB-2010-002431 // CNNVD: CNNVD-201011-173 // NVD: CVE-2010-3787

CREDITS

Nils of MWR InfoSecurity

Trust: 0.3

sources: BID: 44798

SOURCES

db:CERT/CCid:VU#309873
db:VULHUBid:VHN-46392
db:BIDid:44798
db:JVNDBid:JVNDB-2010-002431
db:CNNVDid:CNNVD-201011-173
db:NVDid:CVE-2010-3787

LAST UPDATE DATE

2025-04-11T20:46:44.326000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#309873date:2012-03-28T00:00:00
db:VULHUBid:VHN-46392date:2010-12-18T00:00:00
db:BIDid:44798date:2010-12-08T16:25:00
db:JVNDBid:JVNDB-2010-002431date:2010-12-17T00:00:00
db:CNNVDid:CNNVD-201011-173date:2010-11-18T00:00:00
db:NVDid:CVE-2010-3787date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#309873date:2010-12-08T00:00:00
db:VULHUBid:VHN-46392date:2010-11-16T00:00:00
db:BIDid:44798date:2010-11-10T00:00:00
db:JVNDBid:JVNDB-2010-002431date:2010-12-01T00:00:00
db:CNNVDid:CNNVD-201011-173date:2010-11-18T00:00:00
db:NVDid:CVE-2010-3787date:2010-11-16T22:00:16.103