Overview
Apple QuickTime contains a stack buffer overflow vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition.
Description
Real Time Streaming Protocol (RTSP) is a protocol that is used by streaming media systems. The Apple QuickTime Streaming Server and QuickTime player both support RTSP. Apple QuickTime contains a stack buffer overflow vulnerability in the way QuickTime handles the RTSP Content-Type header. This vulnerability may be exploited by convincing a user to connect to a specially crafted RTSP stream. Note that QuickTime is a component of Apple iTunes, therefore iTunes installations are also affected by this vulnerability. We are aware of publicly available exploit code for this vulnerability. |
Impact
By convincing a user to connect to a specially crafted RTSP stream, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. An attacker can use various types of web page content, including a QuickTime Media Link file, to cause a user to load an RTSP stream. |
Solution
Apple has released QuickTime 7.3.1 to address this issue. Until updates can be applied, please consider the following workarounds. Note that these workarounds block certain attack vectors, but do not remove the vulnerability. |
Uninstall QuickTime |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://docs.info.apple.com/article.html?artnum=307176
- http://www.beskerming.com/security/2007/11/25/74/QuickTime_-_Remote_hacker_automatic_control
- http://tools.ietf.org/html/rfc2326
- http://tools.ietf.org/html/rfc2326#section-12.16
- http://www.apple.com/quicktime/technologies/streaming/
- http://www.gnucitizen.org/blog/backdooring-mp3-files/
- http://developer.apple.com/quicktime/icefloe/dispatch028.html
- http://www.apple.com/quicktime/resources/qt/us/proxy/
- http://www.milw0rm.com/exploits/4648
- http://www.milw0rm.com/exploits/4651
- http://www.milw0rm.com/exploits/4657
- http://quicktime.tc.columbia.edu/users/iml/movies/mtest.html
- http://www.symantec.com/enterprise/security_response/weblog/2007/12/exploit_for_apple_quicktime_vu.html
- http://www.rubicode.com/Software/RCDefaultApp/
Acknowledgements
This vulnerability was publicly disclosed by Krystian Kloskowski.
This document was written by Ryan Giobbi and Will Dormann.
Other Information
CVE IDs: | CVE-2007-6166 |
Severity Metric: | 40.32 |
Date Public: | 2007-11-23 |
Date First Published: | 2007-11-24 |
Date Last Updated: | 2008-01-11 00:39 UTC |
Document Revision: | 70 |