Check Point Advisories

Apple QuickTime FPX File Handling Integer Overflow (CVE-2006-1249)

Check Point Reference: CPAI-2006-198
Date Published: 10 Dec 2009
Severity: High
Last Updated: Thursday 10 December, 2009
Source:
Industry Reference:CVE-2006-1249
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description Apple QuickTime is a popular multi-media playback and light editing application. The QuickTime suite includes the QuickTime Player, which is capable of displaying movies, images and audio, as well as the PictureViewer, which is a light-weight application capable of displaying still images only. The applications share a common set of libraries that are used to parse and display the images. A heap based buffer overflow vulnerability exists within certain versions of the QuickTime product. The affected product does not correctly verify some user supplied values that define the structure of an FPX file. This vulnerability can be exploited by enticing the user to open a malicious FPX file, which may results in arbitrary code being executed on a vulnerable target host within the security context of the currently logged in user. The behaviour of the affected application is fully dependent on the outcome of an attack attempt. In the case of an unsuccessful attack, the application will result in unexpected termination. In the case where the flow of the vulnerable process is successfully diverted, the behaviour of the target host system is fully dependent on the intention of the supplied code.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Apple QuickTime FPX File Handling Integer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Apple QuickTime Protection Violation.
Attack Information:  Apple QuickTime FPX file handling integer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK