Check Point Reference: | CPAI-2006-198 |
Date Published: | 10 Dec 2009 |
Severity: | High |
Last Updated: | Thursday 10 December, 2009 |
Source: | |
Industry Reference: | CVE-2006-1249 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Apple QuickTime is a popular multi-media playback and light editing application. The QuickTime suite includes the QuickTime Player, which is capable of displaying movies, images and audio, as well as the PictureViewer, which is a light-weight application capable of displaying still images only. The applications share a common set of libraries that are used to parse and display the images. A heap based buffer overflow vulnerability exists within certain versions of the QuickTime product. The affected product does not correctly verify some user supplied values that define the structure of an FPX file. This vulnerability can be exploited by enticing the user to open a malicious FPX file, which may results in arbitrary code being executed on a vulnerable target host within the security context of the currently logged in user. The behaviour of the affected application is fully dependent on the outcome of an attack attempt. In the case of an unsuccessful attack, the application will result in unexpected termination. In the case where the flow of the vulnerable process is successfully diverted, the behaviour of the target host system is fully dependent on the intention of the supplied code. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Apple QuickTime Protection Violation.
Attack Information: Apple QuickTime FPX file handling integer overflow