ID

VAR-201311-0207


CVE

CVE-2013-6114


TITLE

Apple Motion of OZDocument::parseElement Integer overflow vulnerability in functions

Trust: 0.8

sources: JVNDB: JVNDB-2013-005003

DESCRIPTION

Integer overflow in the OZDocument::parseElement function in Apple Motion 5.0.7 allows remote attackers to cause a denial of service (application crash) via a (1) large or (2) small value in the subview attribute of a viewer element in a .motn file. Apple Motion is prone to a remote integer-overflow vulnerability because it fails to properly bounds-check user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Apple Motion 5.0.7 is vulnerable; other version may also be affected. The tool works with Final Cut Pro (video non-linear editing software) to create compelling titles, transitions, special effects, and more. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-12-19-1 Motion 5.1 Motion 5.1 is now available and addresses the following: Motion Available for: OS X Mavericks v10.9 or later Impact: A maliciously crafted .motn file could lead to arbitrary code execution Description: An integer overflow existed in the handling of .motn files which led to an out of bounds memory access. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-6114 : Jean Pascal Pereira Motion 5.1 may be obtained from the Mac App Store. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJSssLjAAoJEPefwLHPlZEwDwwQAJ5cXQe9I7In8kPrE27xB10/ ejogkZa8FAzS9mwcuvszAxITy35e0JKe+ou65+y1F+Rv+CT9VVzzIlEP7dGr5AUa r88ok05hzQbUsFRdCa/WIE2ERUVDl0aF1T696RQj4Ulxv0nMB7L54QjW1QixH3Sj ubU6X47SdqtVopYz0ca7MPh9O92UNZNwT44dQZco03FqzAdremWNyo/E5GYCqN4d H2BUIbKOrahhfSF8x+Xtl0xaGFbNTZBY9Y2258tisDyvuvVbFGdHKbLT/n1FSUNu CYzsxiCx+cXPEgxR+CeNNvPcva8Lr3uMZginGdOVkkJFD5MWahUv3DuiHgjrmVZv 4MB/cP2tQwfTznbZYf+k3SLUt0dM/WLbE5eV6FGuDeNe7w5z1UHGTcYfCVK5yKe3 /c0NaGtpgMOaaq/UmF41U9/R2wqLUXu0nsoscG9HG10yXGsL/8/Jzfm/CQ5Nr6t5 YpjwCZU3AO/ZhQWbD5PrBMsvcCllXO/aOSSq6z2OCTDHNnotbktQZ9a+7wikC+O3 8u0/Nvwp0K+nzCRa4AMUkZzC1GoQZ6UytU8S26ifWnyXyqs4lNGSX7rmd7hwJcVA QY8k/7Zjj66Uraafolb83nXO6TL/kf1clomHFILTXEwyQUI5hmKiwpKFijAPT0ju ZunhUVBiBiHHSjEFp+p2 =00oP -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2013-6114 // JVNDB: JVNDB-2013-005003 // BID: 62874 // VULHUB: VHN-66116 // PACKETSTORM: 124559

AFFECTED PRODUCTS

vendor:applemodel:motionscope:eqversion:5.0.7

Trust: 1.6

sources: CNNVD: CNNVD-201310-194 // NVD: CVE-2013-6114

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6114
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-6114
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201310-194
value: MEDIUM

Trust: 0.6

VULHUB: VHN-66116
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-6114
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-66116
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-66116 // JVNDB: JVNDB-2013-005003 // CNNVD: CNNVD-201310-194 // NVD: CVE-2013-6114

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.1

problemtype:CWE-189

Trust: 0.8

sources: VULHUB: VHN-66116 // JVNDB: JVNDB-2013-005003 // NVD: CVE-2013-6114

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-194

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201310-194

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005003

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-66116

PATCH

title:Motion 5url:http://www.apple.com/jp/finalcutpro/motion/

Trust: 0.8

title:HT6041url:http://support.apple.com/kb/HT6041

Trust: 0.8

title:HT6041url:http://support.apple.com/kb/HT6041?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2013-005003

EXTERNAL IDS

db:NVDid:CVE-2013-6114

Trust: 2.9

db:EXPLOIT-DBid:28811

Trust: 1.7

db:BIDid:62874

Trust: 1.0

db:JVNid:JVNVU90537868

Trust: 0.8

db:JVNDBid:JVNDB-2013-005003

Trust: 0.8

db:CNNVDid:CNNVD-201310-194

Trust: 0.7

db:PACKETSTORMid:124559

Trust: 0.2

db:VULHUBid:VHN-66116

Trust: 0.1

sources: VULHUB: VHN-66116 // BID: 62874 // JVNDB: JVNDB-2013-005003 // PACKETSTORM: 124559 // CNNVD: CNNVD-201310-194 // NVD: CVE-2013-6114

REFERENCES

url:http://www.exploit-db.com/exploits/28811/

Trust: 1.7

url:http://support.apple.com/kb/ht6041

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6114

Trust: 0.8

url:http://jvn.jp/cert/jvnvu90537868/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6114

Trust: 0.8

url:http://www.securityfocus.com/bid/62874

Trust: 0.6

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6114

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

sources: VULHUB: VHN-66116 // JVNDB: JVNDB-2013-005003 // PACKETSTORM: 124559 // CNNVD: CNNVD-201310-194 // NVD: CVE-2013-6114

CREDITS

Jean Pascal Pereira

Trust: 0.9

sources: BID: 62874 // CNNVD: CNNVD-201310-194

SOURCES

db:VULHUBid:VHN-66116
db:BIDid:62874
db:JVNDBid:JVNDB-2013-005003
db:PACKETSTORMid:124559
db:CNNVDid:CNNVD-201310-194
db:NVDid:CVE-2013-6114

LAST UPDATE DATE

2025-04-11T23:14:41.564000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-66116date:2016-09-30T00:00:00
db:BIDid:62874date:2013-12-23T01:18:00
db:JVNDBid:JVNDB-2013-005003date:2013-12-25T00:00:00
db:CNNVDid:CNNVD-201310-194date:2013-11-05T00:00:00
db:NVDid:CVE-2013-6114date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-66116date:2013-11-04T00:00:00
db:BIDid:62874date:2013-10-07T00:00:00
db:JVNDBid:JVNDB-2013-005003date:2013-11-06T00:00:00
db:PACKETSTORMid:124559date:2013-12-20T19:02:22
db:CNNVDid:CNNVD-201310-194date:2013-10-15T00:00:00
db:NVDid:CVE-2013-6114date:2013-11-04T15:55:05.680