[PCWorks] Apple QuickTime Multiple Vulnerabilities

  • From: "Clint Hamilton-PCWorks Admin-OrpheusComputing.com & ComputersCustomBuilt.com" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Fri, 4 Apr 2008 06:20:28 -0500

TITLE:
Apple QuickTime Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA29650

VERIFY ADVISORY:
http://secunia.com/advisories/29650/

CRITICAL:
Highly critical

IMPACT:
Exposure of sensitive information, DoS, System access

WHERE:
From remote

SOFTWARE:
Apple QuickTime 7.x
http://secunia.com/product/5090/

DESCRIPTION:
Some vulnerabilities have been reported in Apple QuickTime, 
which can
be exploited by malicious people to disclose potentially 
sensitive
information or compromise a vulnerable system.

1) An implementation error in QuickTime for Java allows 
untrusted
Java applets to deserialize objects provided by QTJava. This 
can be
exploited to disclose sensitive information or execute 
arbitrary code
e.g. when a user visits a malicious web page.

2) An unspecified error in the handling of external URLs 
embedded in
movie files can lead to information disclosure.

3) An input validation error in the handling of data reference 
atoms
within movie files can be exploited to cause a buffer overflow 
when a
specially crafted movie is viewed.

4) An unspecified error in the handling of movie media tracks 
can be
exploited to cause a memory corruption when a specially crafted 
movie
is viewed.

5) A boundary error in the parsing of "crgn" atoms can be 
exploited
to cause a heap-based buffer overflow when a specially crafted 
movie
file is viewed.

6) A boundary error in the parsing of "chan" atoms can be 
exploited
to cause a heap-based buffer overflow when a specially crafted 
movie
file is viewed.

7) A boundary error in the handling of PICT records can be 
exploited
to cause a heap-based buffer overflow when a specially crafted 
PICT
image is viewed.

8) A boundary error in the handling of error messages when 
processing
PICT images can be exploited to cause a heap-based buffer 
overflow.

NOTE: This vulnerability does not affect Mac OS X systems.

9) A boundary error in the handling of Animation codec content 
can be
exploited to cause a heap-based buffer overflow when a 
specially
crafted movie file is viewed.

NOTE: This vulnerability does not affect Mac OS X systems.

10) A boundary error in the parsing of "obji" atoms can be 
exploited
to cause a stack-based buffer overflow when a specially crafted
QuickTime VR movie file is viewed.

11) A boundary error in the parsing of the Clip opcode can be
exploited to cause a heap-based buffer overflow when a 
specially
crafted PICT image file is viewed.

Successful exploitation of these vulnerabilities may allow 
execution
of arbitrary code.

SOLUTION:
Update to version 7.4.5.

QuickTime 7.4.5 for Windows:
http://www.apple.com/support/downloads/quicktime745forwindows.html

QuickTime 7.4.5 for Leopard:
http://www.apple.com/support/downloads/quicktime745forleopard.html

QuickTime 7.4.5 for Panther:
http://www.apple.com/support/downloads/quicktime745forpanther.html

QuickTime 7.4.5 for Tiger:
http://www.apple.com/support/downloads/quicktime745fortiger.html

ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT1241


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.

Other related posts: