ID

VAR-201108-0028


CVE

CVE-2011-0257


TITLE

Apple of QuickTime Integer sign error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2011-004057

DESCRIPTION

Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in a PICT file that triggers a stack-based buffer overflow. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the way Quicktime handles the PnSize PICT opcode. It converts an unsigned 16 bit value into a signed 32 bit value. This value is later used as the size parameter for a memory copy function that copies from the file onto the stack. The results in a stack based buffer overflow that allows for remote code execution under the context of the current user. Apple QuickTime is prone to a stack-based buffer-overflow vulnerability because of a failure to properly bounds check user-supplied data. Successful exploits will allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts may cause denial-of-service conditions. Versions prior to QuickTime 7.7 are vulnerable. Apple QuickTime is a popular multimedia player. Apple QuickTime's handling of PnSize PICT codes is flawed. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT4826 -- Disclosure Timeline: 2011-04-11 - Vulnerability reported to vendor 2011-08-08 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Matt "j00ru" Jurczyk -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.79

sources: NVD: CVE-2011-0257 // JVNDB: JVNDB-2011-004057 // ZDI: ZDI-11-252 // BID: 49144 // VULHUB: VHN-48202 // VULMON: CVE-2011-0257 // PACKETSTORM: 103969

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.6.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.67.75.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.6.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.6.5

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.6.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.6.6

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.6.8

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.66.71.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.6.7

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.2.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.1.70

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.4.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.5

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:quicktimescope:lteversion:7.6.9

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:quicktimescope:ltversion:7.7

Trust: 0.8

vendor:applemodel:quicktimescope: - version: -

Trust: 0.7

vendor:applemodel:quicktimescope:eqversion:7.6.9

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.6.8

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.7

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.6(1671)

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.64.17.73

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.9

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.7

Trust: 0.3

sources: ZDI: ZDI-11-252 // BID: 49144 // JVNDB: JVNDB-2011-004057 // CNNVD: CNNVD-201108-266 // NVD: CVE-2011-0257

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0257
value: HIGH

Trust: 1.0

NVD: CVE-2011-0257
value: HIGH

Trust: 0.8

ZDI: CVE-2011-0257
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201108-266
value: CRITICAL

Trust: 0.6

VULHUB: VHN-48202
value: HIGH

Trust: 0.1

VULMON: CVE-2011-0257
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0257
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

ZDI: CVE-2011-0257
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-48202
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-11-252 // VULHUB: VHN-48202 // VULMON: CVE-2011-0257 // JVNDB: JVNDB-2011-004057 // CNNVD: CNNVD-201108-266 // NVD: CVE-2011-0257

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-48202 // JVNDB: JVNDB-2011-004057 // NVD: CVE-2011-0257

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 103969 // CNNVD: CNNVD-201108-266

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201108-266

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-004057

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-48202 // VULMON: CVE-2011-0257

PATCH

title:HT4826url:http://support.apple.com/kb/HT4826

Trust: 1.5

title:curso_exploiting_en_windowsurl:https://github.com/newlog/curso_exploiting_en_windows

Trust: 0.1

sources: ZDI: ZDI-11-252 // VULMON: CVE-2011-0257 // JVNDB: JVNDB-2011-004057

EXTERNAL IDS

db:NVDid:CVE-2011-0257

Trust: 3.7

db:ZDIid:ZDI-11-252

Trust: 2.9

db:EXPLOIT-DBid:17777

Trust: 1.2

db:SREASONid:8365

Trust: 1.2

db:JVNDBid:JVNDB-2011-004057

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1164

Trust: 0.7

db:CNNVDid:CNNVD-201108-266

Trust: 0.7

db:NSFOCUSid:17534

Trust: 0.6

db:NSFOCUSid:18205

Trust: 0.6

db:BIDid:49144

Trust: 0.4

db:PACKETSTORMid:103969

Trust: 0.2

db:PACKETSTORMid:104783

Trust: 0.1

db:SEEBUGid:SSVID-72057

Trust: 0.1

db:SEEBUGid:SSVID-88901

Trust: 0.1

db:VULHUBid:VHN-48202

Trust: 0.1

db:VULMONid:CVE-2011-0257

Trust: 0.1

sources: ZDI: ZDI-11-252 // VULHUB: VHN-48202 // VULMON: CVE-2011-0257 // BID: 49144 // JVNDB: JVNDB-2011-004057 // PACKETSTORM: 103969 // CNNVD: CNNVD-201108-266 // NVD: CVE-2011-0257

REFERENCES

url:http://support.apple.com/kb/ht4826

Trust: 2.9

url:http://zerodayinitiative.com/advisories/zdi-11-252/

Trust: 1.8

url:http://www.exploit-db.com/exploits/17777

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a16059

Trust: 1.2

url:http://securityreason.com/securityalert/8365

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0257

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0257

Trust: 0.8

url:http://www.nsfocus.net/vulndb/17534

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18205

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-11-252/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/189.html

Trust: 0.1

url:https://github.com/newlog/curso_exploiting_en_windows

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/17777/

Trust: 0.1

url:https://www.rapid7.com/db/modules/exploit/windows/fileformat/apple_quicktime_pnsize

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=23902

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-11-252

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0257

Trust: 0.1

sources: ZDI: ZDI-11-252 // VULHUB: VHN-48202 // VULMON: CVE-2011-0257 // BID: 49144 // JVNDB: JVNDB-2011-004057 // PACKETSTORM: 103969 // CNNVD: CNNVD-201108-266 // NVD: CVE-2011-0257

CREDITS

Matt "j00ru" Jurczyk

Trust: 1.3

sources: ZDI: ZDI-11-252 // CNNVD: CNNVD-201108-266

SOURCES

db:ZDIid:ZDI-11-252
db:VULHUBid:VHN-48202
db:VULMONid:CVE-2011-0257
db:BIDid:49144
db:JVNDBid:JVNDB-2011-004057
db:PACKETSTORMid:103969
db:CNNVDid:CNNVD-201108-266
db:NVDid:CVE-2011-0257

LAST UPDATE DATE

2025-04-11T22:54:00.594000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-11-252date:2011-08-08T00:00:00
db:VULHUBid:VHN-48202date:2017-09-19T00:00:00
db:VULMONid:CVE-2011-0257date:2017-09-19T00:00:00
db:BIDid:49144date:2011-09-05T08:30:00
db:JVNDBid:JVNDB-2011-004057date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201108-266date:2011-09-07T00:00:00
db:NVDid:CVE-2011-0257date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-11-252date:2011-08-08T00:00:00
db:VULHUBid:VHN-48202date:2011-08-15T00:00:00
db:VULMONid:CVE-2011-0257date:2011-08-15T00:00:00
db:BIDid:49144date:2011-08-12T00:00:00
db:JVNDBid:JVNDB-2011-004057date:2012-03-27T00:00:00
db:PACKETSTORMid:103969date:2011-08-13T20:24:44
db:CNNVDid:CNNVD-201108-266date:2011-08-15T00:00:00
db:NVDid:CVE-2011-0257date:2011-08-15T21:55:01.270