Check Point Reference: | CPAI-2004-138 |
Date Published: | 7 Apr 2010 |
Severity: | High |
Last Updated: | Sunday 28 September, 2014 |
Source: | |
Industry Reference: | CVE-2004-0431 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | There is an integer overflow in the media file parsing mechanism within Apple QuickTime, a tool that allows users to play, create, and deliver multimedia. There is a vulnerability in the media file parser within Apple QuickTime. It is possible for a remote attacker to execute arbitrary code on the victim's computer in the context of the victim user when they open a malicious QuickTime file. It is expected that a vulnerable QuickTime program will terminate upon the launch of a malicious QuickTime file. The QuickTime application must be restarted for renewed QuickTime accessibility. However, it is possible that a specially crafted QuickTime file will facilitate the execution of arbitrary code on the remote server in the context of the user opening or viewing the malicious file. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Apple QuickTime Protection Violation.
Attack Information: Apple Quicktime heap overflow