search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple QuickTime fails to properly handle corrupt GIF images

Vulnerability Note VU#913449

Original Release Date: 2006-01-11 | Last Revised: 2006-01-31

Overview

Apple's QuickTime is a player for files and streaming media in a variety of different formats. A flaw in QuickTime's handling of files in the Graphics Interchange Format (GIF) could allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

A heap overflow exists in the way QuickTime handles the Netscape Navigator Application Extension Block of a GIF image. A specially crafted GIF image can allow attackers to execute arbitrary code of their choosing with the privileges of the user running QuickTime.

Note that this issue affects QuickTime installations on both Apple Mac OS X and Microsoft Windows operating systems.

Impact

An attacker with the ability to supply a maliciously crafted GIF file (.gif) could execute arbitrary code on a vulnerable system. The attacker-supplied code would be executed with the privileges of the QuickTime user opening the malicious file. The crafted GIF image may be supplied on a webpage or in email, or by some other means designed to encourage the victim to invoke QuickTime on the exploit image.

Solution

Install an update

Apple has addressed this issue with Quicktime 7.0.4, as specified in Apple Support Document 303101.

Vendor Information

913449
 

Apple Computer, Inc. Affected

Updated:  January 11, 2006

Status

Affected

Vendor Statement

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2006-01-10 QuickTime 7.0.4

QuickTime 7.0.4 is available and delivers the following security
enhancements:

CVE-ID: CVE-2005-2340
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: A maliciously-crafted QTIF image may result in arbitrary code
execution
Description: By carefully crafting a corrupt QTIF image, an attacker
can trigger a heap buffer overflow that may result in arbitrary code
execution. This update addresses the issue by performing additional
validation of GIF images.  Credit to Varun Uppal of Kanbay for
reporting this issue.

CVE-ID: CVE-2005-3707, CVE-2005-3708, CVE-2005-3709
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted TGA image may result in
arbitrary code execution
Description: By carefully crafting a corrupt TGA image, an attacker
can trigger a buffer overflow, integer overflow, or integer underflow
that may result in a denial-of-service or arbitrary code execution.
This update addresses the issue by performing additional validation
of TGA images.  Credit to Dejun Meng of Fortinet for reporting this
issue.

CVE-ID: CVE-2005-3710, CVE-2005-3711
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted TIFF image may result in
arbitrary code execution
Description: By carefully crafting a corrupt TIFF image, an attacker
can trigger an integer overflow that may result in a
denial-of-service or arbitrary code execution.  This update addresses
the issue by performing additional validation of TIFF images. Credit
to Dejun Meng of Fortinet for reporting this issue.

CVE-ID: CVE-2005-3713
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: A maliciously-crafted GIF image may result in arbitrary code
execution
Description: By carefully crafting a corrupt GIF image, an attacker
can trigger a heap buffer overflow that may result in arbitrary code
execution. This update addresses the issue by performing additional
validation of GIF images.  Credit to Karl Lynn of eEye Digital
Security for reporting this issue.

CVE-ID: CVE-2005-4092
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: A maliciously-crafted media file may result in arbitrary code
execution
Description: By carefully crafting a corrupt media file, an attacker
can trigger a heap buffer overflow that may result in arbitrary code
execution. This update addresses the issue by performing additional
validation of media files.  Credit to Karl Lynn of eEye Digital
Security for reporting this issue.

QuickTime 7.0.4 may be obtained from the Software Update pane in
System Preferences, or from the Download tab in the QuickTime site
http://www.apple.com/quicktime/

For Mac OS X v10.3.9 or later
The download file is named:  "QuickTimeInstallerX.dmg"
Its SHA-1 digest is:  a605fc27d85b4c6b59ebbbc84ef553b37aa8fbca

For Windows 2000/XP
The download file is named:  "iTunesSetup.exe"
Its SHA-1 digest is:  1f7d1942fec2c3c205079916dc47b254e508de4e

Information will also be posted to the Apple Product Security
web site:  http://docs.info.apple.com/article.html?artnum=61798

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.4 (Build 4042)

iQEVAwUBQ8QXBYHaV5ucd/HdAQJxEAgAmYODWY0Bi3uyqkrk7iH3jB3HsmjARyqz
YMFag6iFmvkGJ4VAZ943RhbrcBsjk8XQAMtnolRuD4FGSQQHD7a4fzeYdGIRp3qo
V2XZBVW1cMAS8x0KzGNKhbRZsZZQw+0AcXbBq8oJU87XtjxVIM7Oo89k03AtkY1M
bSqM/IshcNrvbtUDqOsxFEufNN2gwPeGD4Hsqto1qd822AF4Ulpdp45E8kgCiqFA
Jm72cj6g1LqXZs8PZZdp6/eD9AazDPDe6N4yC6WhZMXJcfiAaZY6wNSYXsSVceGK
W6+0hr4el+bB3PA2o7stKVrK2FwhuYg0A/FiiyhkM6K25jwf8OgZsw==
=SKXP
-----END PGP SIGNATURE-----

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Apple credits Karl Lynn of eEye Digital Security for reporting this issue. However, the eEye advisory on this issue credits Fang Xing.

This document was written by Chad R Dougherty based on information supplied by Apple and eEye Digital Security.

Other Information

CVE IDs: CVE-2005-3713
Severity Metric: 3.85
Date Public: 2006-01-10
Date First Published: 2006-01-11
Date Last Updated: 2006-01-31 15:14 UTC
Document Revision: 22

Sponsored by CISA.