Check Point Reference: | CPAI-2008-204 |
Date Published: | 26 Feb 2008 |
Severity: | Critical |
Last Updated: | Tuesday 01 January, 2008 |
Source: | |
Industry Reference: | CVE-2007-2296 CVE-2007-0462 CVE-2007-4672 CVE-2007-4676 |
Protection Provided by: | |
Who is Vulnerable? | Apple Quicktime 7.1.5 and other versions before 7.2 Apple Quicktime 7.1.3 and other applications on Mac OS X 10.4.8 and earlier Apple QuickTime before 7.3 |
Vulnerability Description | Several vulnerabilities have been identified within various versions of Apple QuickTime and Apple QuickDraw that, if exploited, would allow a remote attacker to execute arbitrary code on a vulnerable system. |
Vulnerability Details | Integer overflow in the FlipFileTypeAtom_BtoN function in Apple QuickTime 7.1.5, and other versions before 7.2, allows remote attackers to execute arbitrary code via a crafted M4V (MP4) file. The _GetSrcBits32ARGB function in Apple QuickDraw, as used by QuickTime 7.1.3 and other applications on Mac OS X 10.4.8 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PICT image with a malformed Alpha RGB (ARGB) record, which triggers memory corruption. Stack-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via an invalid UncompressedQuickTimeData opcode length in a PICT image. Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via malformed elements when parsing (1) Poly type (0x0070 through 0x0074) and (2) PackBitsRgn field (0x0099) opcodes in a PICT image. |