Overview
The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition.
Description
PICT is a graphics file format that was used by Apple Macintosh systems prior to OS X as their standard metafile format. OS X systems can open and display PICT files. Apple QuickTime contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code with the privileges of the user running QuickTime. By convincing a user to open a specially crafted PICT file with QuickTime, an attacker can trigger the overflow. |
Impact
A remote, unauthenticated attacker can execute arbitrary code or create a denial-of-service condition. The crafted QuickTime PICT file may be supplied on a web page, in an email for the victim to select, or by some other means designed to encourage them to invoke QuickTime on the exploit file. |
Solution
Update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://docs.info.apple.com/article.html?artnum=305149
- http://www.apple.com/quicktime/download/
- http://www.apple.com/itunes/
- http://secunia.com/advisories/24359/
- http://www.auscert.org.au/7356
- http://en.wikipedia.org/wiki/PICT
- http://www.us-cert.gov/cas/tips/ST04-010.html
- http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q294676
- http://www.cert.org/tech_tips/before_you_plug_in.html
- http://www.mozilla.org/support/firefox/faq
- http://www.ciac.org/ciac/bulletins/r-171.shtml
- http://www.securityfocus.com/bid/22827
Acknowledgements
Thanks to Apple for information that was used in this report. Apple in turn thanks Mike Price of McAfee AVERT Labs.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2007-0715 |
Severity Metric: | 4.81 |
Date Public: | 2007-03-06 |
Date First Published: | 2007-03-06 |
Date Last Updated: | 2007-03-09 15:02 UTC |
Document Revision: | 17 |