ID

VAR-200512-0296


CVE

CVE-2005-3709


TITLE

Apple QuickTime fails to properly handle corrupt media files

Trust: 0.8

sources: CERT/CC: VU#921193

DESCRIPTION

Integer underflow in Apple Quicktime before 7.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Color Map Entry Size in a TGA image file. Apple's QuickTime is a player for files and streaming media in a variety of different formats. Apple QuickTime is prone to multiple remote code-execution vulnerabilities. These issues arise when the application handles specially crafted QTIF, TGA, TIFF, and GIF image formats. Successful exploits of these issues may allow remote attackers to trigger a denial-of-service condition or to gain unauthorized access. Versions prior to QuickTime 7.0.4 are vulnerable. A successful attack can result in a remote compromise. NOTE: This issue was previously discussed in BID 16202 (Apple QuickTime Multiple Code Execution Vulnerabilities), but has been assigned its own record to better document the vulnerability. Fortinet Security Advisory: FSA-2006-06 Apple QuickTime Player Color Map Entry Size Buffer Overflow Advisory Date : January 12, 2006 Reported Date : November 28, 2005 Vendor : Apple computers Affected Products : Apple QuickTime Player v7.0.3 Severity : High Reference : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3709 http://docs.info.apple.com/article.html?artnum=303101 http://www.securityfocus.com/bid/16202/info Description : Fortinet Security Research Team (FSRT) has discovered a Buffer Overflow Vulnerability in the Apple QuickTime Player. This is due to application failure to sanitize the parameter Color Map Entry Size while parsing TGA image files. Impact : Execute arbitrary code Solution : Apple Computers has released a security update for this vulnerability, which is available for downloading from Apples's web site under security update. Fortinet Protection: Fortinet is protecting network from this vulnerability with latest IPS update. Acknowledgment : Dejun Meng of Fortinet Security Research team found this vulnerability. Disclaimer : Although Fortinet has attempted to provide accurate information in these materials, Fortinet assumes no legal responsibility for the accuracy or completeness of the information. More specific information is available on request from Fortinet. Please note that Fortinet's product information does not constitute or contain any guarantee, warranty or legally binding representation, unless expressly identified as such in a duly signed writing. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . TITLE: QuickTime Multiple Image/Media File Handling Vulnerabilities SECUNIA ADVISORY ID: SA18370 VERIFY ADVISORY: http://secunia.com/advisories/18370/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. 1) A boundary error in the handling of QTIF images can be exploited to cause a heap-based buffer overflow. This may allow arbitrary code execution when a malicious QTIF image is viewed. 2) Some boundary and integer overflow/underflow errors in the handling of TGA images can be exploited to cause a buffer overflow. 3) An integer overflow error exists in the handling of TIFF images. This can potentially be exploited to execute arbitrary code when a malicious TIFF image is viewed. 4) A boundary error in the handling of GIF images can be exploited to cause a heap-based buffer overflow. This may allow arbitrary code execution when a malicious media file is viewed. The vulnerabilities affect both the Mac OS X and the Windows platforms. SOLUTION: Update to version 7.0.4. Mac OS X (version 10.3.9 or later): http://www.apple.com/support/downloads/quicktime704.html Windows 2000/XP: http://www.apple.com/quicktime/download/win.html PROVIDED AND/OR DISCOVERED BY: 1) Varun Uppal, Kanbay. 2-3) Dejun Meng, Fortinet. 4-5) Karl Lynn, eEye Digital Security. ORIGINAL ADVISORY: http://docs.info.apple.com/article.html?artnum=303101 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 5.31

sources: NVD: CVE-2005-3709 // CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // BID: 16202 // BID: 16875 // VULHUB: VHN-14917 // PACKETSTORM: 43082 // PACKETSTORM: 42996

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 4.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:lteversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.6

vendor:applemodel:quicktime playerscope:neversion:7.0.4

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.4

Trust: 0.3

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // BID: 16202 // BID: 16875 // CNNVD: CNNVD-200512-800 // NVD: CVE-2005-3709

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3709
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#921193
value: 43.88

Trust: 0.8

CARNEGIE MELLON: VU#115729
value: 3.85

Trust: 0.8

CARNEGIE MELLON: VU#150753
value: 32.63

Trust: 0.8

CARNEGIE MELLON: VU#913449
value: 3.85

Trust: 0.8

CARNEGIE MELLON: VU#687201
value: 16.40

Trust: 0.8

CNNVD: CNNVD-200512-800
value: HIGH

Trust: 0.6

VULHUB: VHN-14917
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-3709
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14917
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // VULHUB: VHN-14917 // CNNVD: CNNVD-200512-800 // NVD: CVE-2005-3709

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.1

sources: VULHUB: VHN-14917 // NVD: CVE-2005-3709

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 43082 // CNNVD: CNNVD-200512-800

TYPE

Boundary Condition Error

Trust: 0.6

sources: BID: 16202 // BID: 16875

EXTERNAL IDS

db:SECUNIAid:18370

Trust: 5.8

db:BIDid:16202

Trust: 2.9

db:NVDid:CVE-2005-3709

Trust: 2.1

db:SECTRACKid:1015464

Trust: 1.7

db:VUPENid:ADV-2006-0128

Trust: 1.7

db:OSVDBid:22336

Trust: 1.7

db:SECTRACKid:1015466

Trust: 1.6

db:CERT/CCid:VU#921193

Trust: 0.8

db:CERT/CCid:VU#115729

Trust: 0.8

db:OSVDBid:22337

Trust: 0.8

db:CERT/CCid:VU#150753

Trust: 0.8

db:CERT/CCid:VU#913449

Trust: 0.8

db:CERT/CCid:VU#687201

Trust: 0.8

db:CNNVDid:CNNVD-200512-800

Trust: 0.7

db:NSFOCUSid:8393※8395※8392※8394

Trust: 0.6

db:NSFOCUSid:8395

Trust: 0.6

db:NSFOCUSid:8392

Trust: 0.6

db:NSFOCUSid:8393

Trust: 0.6

db:NSFOCUSid:8394

Trust: 0.6

db:FULLDISCid:20060112 FORTINET ADVISORY: APPLE QUICKTIME PLAYER COLOR MAP ENTRY SIZE BUFFER OVERFLOW

Trust: 0.6

db:APPLEid:APPLE-SA-2006-01-10

Trust: 0.6

db:XFid:24058

Trust: 0.6

db:BIDid:16875

Trust: 0.4

db:PACKETSTORMid:43082

Trust: 0.2

db:VULHUBid:VHN-14917

Trust: 0.1

db:PACKETSTORMid:42996

Trust: 0.1

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // VULHUB: VHN-14917 // BID: 16202 // BID: 16875 // PACKETSTORM: 43082 // PACKETSTORM: 42996 // CNNVD: CNNVD-200512-800 // NVD: CVE-2005-3709

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=303101

Trust: 5.9

url:http://secunia.com/advisories/18370/

Trust: 4.1

url:http://www.securityfocus.com/bid/16202

Trust: 2.5

url:http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0447.html

Trust: 1.7

url:http://www.osvdb.org/22336

Trust: 1.7

url:http://securitytracker.com/id?1015464

Trust: 1.7

url:http://secunia.com/advisories/18370

Trust: 1.7

url:http://securitytracker.com/alerts/2006/jan/1015466.html

Trust: 1.6

url:http://www.vupen.com/english/advisories/2006/0128

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/24058

Trust: 1.1

url:http://www.eeye.com/html/research/advisories/ad20060111a.html

Trust: 0.8

url:http://www.osvdb.org/displayvuln.php?osvdb_id=22337

Trust: 0.8

url:http://www.eeye.com/html/research/advisories/ad20060111d.html

Trust: 0.8

url:http://www.eeye.com/html/research/advisories/ad20060111b.html

Trust: 0.8

url:http://developer.apple.com/documentation/quicktime/ref/refimporter.4.htm

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/24058

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/0128

Trust: 0.6

url:http://www.nsfocus.net/vulndb/8393※8395※8392※8394

Trust: 0.6

url:/archive/1/421561

Trust: 0.3

url:/archive/1/421566

Trust: 0.3

url:/archive/1/421831

Trust: 0.3

url:/archive/1/421799

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3709

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.securityfocus.com/bid/16202/info

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3709

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://www.apple.com/quicktime/download/win.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime704.html

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // VULHUB: VHN-14917 // BID: 16202 // BID: 16875 // PACKETSTORM: 43082 // PACKETSTORM: 42996 // CNNVD: CNNVD-200512-800 // NVD: CVE-2005-3709

CREDITS

Dejun Meng

Trust: 0.7

sources: PACKETSTORM: 43082 // CNNVD: CNNVD-200512-800

SOURCES

db:CERT/CCid:VU#921193
db:CERT/CCid:VU#115729
db:CERT/CCid:VU#150753
db:CERT/CCid:VU#913449
db:CERT/CCid:VU#687201
db:VULHUBid:VHN-14917
db:BIDid:16202
db:BIDid:16875
db:PACKETSTORMid:43082
db:PACKETSTORMid:42996
db:CNNVDid:CNNVD-200512-800
db:NVDid:CVE-2005-3709

LAST UPDATE DATE

2024-08-14T13:50:56.194000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#921193date:2006-01-12T00:00:00
db:CERT/CCid:VU#115729date:2006-01-11T00:00:00
db:CERT/CCid:VU#150753date:2006-01-13T00:00:00
db:CERT/CCid:VU#913449date:2006-01-31T00:00:00
db:CERT/CCid:VU#687201date:2006-01-20T00:00:00
db:VULHUBid:VHN-14917date:2017-07-11T00:00:00
db:BIDid:16202date:2008-05-01T18:56:00
db:BIDid:16875date:2008-05-01T21:46:00
db:CNNVDid:CNNVD-200512-800date:2006-05-24T00:00:00
db:NVDid:CVE-2005-3709date:2017-07-11T01:33:17.440

SOURCES RELEASE DATE

db:CERT/CCid:VU#921193date:2006-01-11T00:00:00
db:CERT/CCid:VU#115729date:2006-01-11T00:00:00
db:CERT/CCid:VU#150753date:2006-01-11T00:00:00
db:CERT/CCid:VU#913449date:2006-01-11T00:00:00
db:CERT/CCid:VU#687201date:2006-01-11T00:00:00
db:VULHUBid:VHN-14917date:2005-12-31T00:00:00
db:BIDid:16202date:2006-01-10T00:00:00
db:BIDid:16875date:2006-01-10T00:00:00
db:PACKETSTORMid:43082date:2006-01-15T16:51:40
db:PACKETSTORMid:42996date:2006-01-12T00:49:01
db:CNNVDid:CNNVD-200512-800date:2005-12-31T00:00:00
db:NVDid:CVE-2005-3709date:2005-12-31T05:00:00