Check Point Advisories

Apple Quicktime Heap Overflow (CVE-2004-0431)

Check Point Reference: CPAI-2004-138
Date Published: 7 Apr 2010
Severity: High
Last Updated: Sunday 28 September, 2014
Source:
Industry Reference:CVE-2004-0431
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description There is an integer overflow in the media file parsing mechanism within Apple QuickTime, a tool that allows users to play, create, and deliver multimedia. There is a vulnerability in the media file parser within Apple QuickTime. It is possible for a remote attacker to execute arbitrary code on the victim's computer in the context of the victim user when they open a malicious QuickTime file. It is expected that a vulnerable QuickTime program will terminate upon the launch of a malicious QuickTime file. The QuickTime application must be restarted for renewed QuickTime accessibility. However, it is possible that a specially crafted QuickTime file will facilitate the execution of arbitrary code on the remote server in the context of the user opening or viewing the malicious file.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Apple Quicktime Heap Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Apple QuickTime Protection Violation.
Attack Information:  Apple Quicktime heap overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK