Check Point Reference: | CPAI-2006-258 |
Date Published: | 25 Jan 2010 |
Severity: | High |
Last Updated: | Monday 25 January, 2010 |
Source: | |
Industry Reference: | CVE-2006-1467 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Apple iTunes is a multimedia player that supports a wide range of media formats. The software supports parsing and displaying picture files as well as numerous video and audio formats. One of the formats that the player is capable of processing is the protected advanced audio coding (AAC) media file format. An integer overflow vulnerability exists in Apple iTunes. The vulnerability is caused due to an improper handling the sample table size atom (STSZ) when processing AAC media files. An attacker may exploit the vulnerability by delivering a crafted AAC media file to a target user and enticing the user to open it, resulting in execution of arbitrary code on the target host within the security context of the current user. In case of an attack where code injection and execution is successful, the behavior of the target system is entirely dependent on the intended purpose of the injected code. Any code executed by the attacker will run with the privileges of the currently logged in user. In case of an attack where code injection is not successful, the process will terminate abnormally. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Apple QuickTime Protection Violation.
Attack Information: Apple iTunes AAC file handling integer overflow