ID

VAR-201508-0108


CVE

CVE-2015-5753


TITLE

Apple OS X of QuickTime Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2015-004291

DESCRIPTION

QuickTime 7 in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file, a different vulnerability than CVE-2015-3765, CVE-2015-3779, CVE-2015-3788, CVE-2015-3789, CVE-2015-3790, CVE-2015-3791, CVE-2015-3792, CVE-2015-5751, and CVE-2015-5779. Apple Mac OS X is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks. Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability). These issues affect OS X prior to 10.10.5. QuickTime is one of the multimedia playback components

Trust: 1.98

sources: NVD: CVE-2015-5753 // JVNDB: JVNDB-2015-004291 // BID: 76340 // VULHUB: VHN-83714

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.0.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7

Trust: 1.1

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.3.4

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

sources: BID: 76340 // JVNDB: JVNDB-2015-004291 // CNNVD: CNNVD-201508-281 // NVD: CVE-2015-5753

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5753
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-5753
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201508-281
value: MEDIUM

Trust: 0.6

VULHUB: VHN-83714
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-5753
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-83714
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-83714 // JVNDB: JVNDB-2015-004291 // CNNVD: CNNVD-201508-281 // NVD: CVE-2015-5753

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-83714 // JVNDB: JVNDB-2015-004291 // NVD: CVE-2015-5753

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201508-281

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201508-281

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004291

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205031url:http://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205031url:http://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:osxupd10.10.5url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=57197

Trust: 0.6

title:iPhone7,1_8.4.1_12H321_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=57198

Trust: 0.6

sources: JVNDB: JVNDB-2015-004291 // CNNVD: CNNVD-201508-281

EXTERNAL IDS

db:NVDid:CVE-2015-5753

Trust: 2.8

db:BIDid:76340

Trust: 2.0

db:SECTRACKid:1033276

Trust: 1.1

db:JVNid:JVNVU94440136

Trust: 0.8

db:JVNDBid:JVNDB-2015-004291

Trust: 0.8

db:CNNVDid:CNNVD-201508-281

Trust: 0.7

db:ZDIid:ZDI-15-390

Trust: 0.3

db:VULHUBid:VHN-83714

Trust: 0.1

sources: VULHUB: VHN-83714 // BID: 76340 // JVNDB: JVNDB-2015-004291 // CNNVD: CNNVD-201508-281 // NVD: CVE-2015-5753

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/76340

Trust: 1.7

url:https://support.apple.com/kb/ht205031

Trust: 1.7

url:http://www.securitytracker.com/id/1033276

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5753

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94440136/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5753

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-390/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00004.html

Trust: 0.3

url:https://support.apple.com/en-ie/ht205031

Trust: 0.3

sources: VULHUB: VHN-83714 // BID: 76340 // JVNDB: JVNDB-2015-004291 // CNNVD: CNNVD-201508-281 // NVD: CVE-2015-5753

CREDITS

An anonymous researcher working with HP's Zero Day Initiative, Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team, Maxime VILLARD of m00nbsd, Ryan Pentney and Richard Johnson of Cisco Talos, Xiaoyong Wu of the Evernote Security Team, JieTao Yang of KeenTeam

Trust: 0.6

sources: CNNVD: CNNVD-201508-281

SOURCES

db:VULHUBid:VHN-83714
db:BIDid:76340
db:JVNDBid:JVNDB-2015-004291
db:CNNVDid:CNNVD-201508-281
db:NVDid:CVE-2015-5753

LAST UPDATE DATE

2025-04-13T20:54:39.010000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-83714date:2017-09-21T00:00:00
db:BIDid:76340date:2016-07-05T21:35:00
db:JVNDBid:JVNDB-2015-004291date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-281date:2015-08-18T00:00:00
db:NVDid:CVE-2015-5753date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-83714date:2015-08-17T00:00:00
db:BIDid:76340date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004291date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-281date:2015-08-18T00:00:00
db:NVDid:CVE-2015-5753date:2015-08-17T00:00:33.860