ID

VAR-200512-0298


CVE

CVE-2005-3711


TITLE

Apple QuickTime fails to properly handle corrupt media files

Trust: 0.8

sources: CERT/CC: VU#921193

DESCRIPTION

Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a TIFF image file with modified (1) "strips" (StripByteCounts) or (2) "bands" (StripOffsets) values. Apple's QuickTime is a player for files and streaming media in a variety of different formats. A successful attack can result in a remote compromise. NOTE: This issue was previously discussed in BID 16202 (Apple QuickTime Multiple Code Execution Vulnerabilities), but has been assigned its own record to better document the vulnerability. Apple QuickTime is prone to multiple remote code-execution vulnerabilities. These issues arise when the application handles specially crafted QTIF, TGA, TIFF, and GIF image formats. Successful exploits of these issues may allow remote attackers to trigger a denial-of-service condition or to gain unauthorized access. Versions prior to QuickTime 7.0.4 are vulnerable. TITLE: QuickTime Multiple Image/Media File Handling Vulnerabilities SECUNIA ADVISORY ID: SA18370 VERIFY ADVISORY: http://secunia.com/advisories/18370/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. 1) A boundary error in the handling of QTIF images can be exploited to cause a heap-based buffer overflow. This may allow arbitrary code execution when a malicious QTIF image is viewed. 2) Some boundary and integer overflow/underflow errors in the handling of TGA images can be exploited to cause a buffer overflow. 3) An integer overflow error exists in the handling of TIFF images. This can potentially be exploited to execute arbitrary code when a malicious TIFF image is viewed. 4) A boundary error in the handling of GIF images can be exploited to cause a heap-based buffer overflow. This may allow arbitrary code execution when a malicious media file is viewed. The vulnerabilities affect both the Mac OS X and the Windows platforms. SOLUTION: Update to version 7.0.4. Mac OS X (version 10.3.9 or later): http://www.apple.com/support/downloads/quicktime704.html Windows 2000/XP: http://www.apple.com/quicktime/download/win.html PROVIDED AND/OR DISCOVERED BY: 1) Varun Uppal, Kanbay. 2-3) Dejun Meng, Fortinet. 4-5) Karl Lynn, eEye Digital Security. ORIGINAL ADVISORY: http://docs.info.apple.com/article.html?artnum=303101 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . This is due to application failure to sanitize the parameter StripByteCounts while parsing TIFF image files. A remote attacker could construct a web page with specially crafted tiff file and entice a victim to view it, when the user opens the TIFF image with Internet Explorer or Apple QuickTime Player, it'll cause memory access violation, and leading to potential Arbitrary Command Execution. Impact : Execute arbitrary code Solution : Apple Computers has released a security update for this vulnerability, which is available for downloading from Apples's web site under security update. Fortinet Protection: Fortinet is protecting network from this vulnerability with latest IPS update. Acknowledgment : Dejun Meng of Fortinet Security Research team found this vulnerability

Trust: 5.4

sources: NVD: CVE-2005-3711 // CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // BID: 16869 // BID: 16202 // VULHUB: VHN-14919 // PACKETSTORM: 42996 // PACKETSTORM: 43077 // PACKETSTORM: 43078

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 4.0

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:lteversion:7.0.3

Trust: 1.0

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.6

vendor:applemodel:quicktime playerscope:neversion:7.0.4

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.4

Trust: 0.3

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // BID: 16869 // BID: 16202 // CNNVD: CNNVD-200512-1000 // NVD: CVE-2005-3711

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3711
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#921193
value: 43.88

Trust: 0.8

CARNEGIE MELLON: VU#115729
value: 3.85

Trust: 0.8

CARNEGIE MELLON: VU#150753
value: 32.63

Trust: 0.8

CARNEGIE MELLON: VU#913449
value: 3.85

Trust: 0.8

CARNEGIE MELLON: VU#687201
value: 16.40

Trust: 0.8

CNNVD: CNNVD-200512-1000
value: HIGH

Trust: 0.6

VULHUB: VHN-14919
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-3711
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14919
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // VULHUB: VHN-14919 // CNNVD: CNNVD-200512-1000 // NVD: CVE-2005-3711

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.1

sources: VULHUB: VHN-14919 // NVD: CVE-2005-3711

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 43077 // PACKETSTORM: 43078 // CNNVD: CNNVD-200512-1000

TYPE

Boundary Condition Error

Trust: 0.6

sources: BID: 16869 // BID: 16202

EXTERNAL IDS

db:SECUNIAid:18370

Trust: 5.8

db:BIDid:16202

Trust: 3.0

db:OSVDBid:22337

Trust: 2.5

db:NVDid:CVE-2005-3711

Trust: 2.2

db:VUPENid:ADV-2006-0128

Trust: 1.7

db:SECTRACKid:1015465

Trust: 1.7

db:SECTRACKid:1015466

Trust: 1.6

db:CERT/CCid:VU#921193

Trust: 0.8

db:CERT/CCid:VU#115729

Trust: 0.8

db:CERT/CCid:VU#150753

Trust: 0.8

db:CERT/CCid:VU#913449

Trust: 0.8

db:CERT/CCid:VU#687201

Trust: 0.8

db:CNNVDid:CNNVD-200512-1000

Trust: 0.7

db:BUGTRAQid:20060112 FORTINET ADVISORY - APPLE QUICKTIME PLAYER STRIPOFFSETS IMPROPER MEMORY ACCESS

Trust: 0.6

db:BUGTRAQid:20060112 FORTINET ADVISORY - APPLE QUICKTIME PLAYER STRIPBYTECOUNTS BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:XFid:24059

Trust: 0.6

db:NSFOCUSid:8392※8395※8394※8393

Trust: 0.6

db:NSFOCUSid:8395

Trust: 0.6

db:NSFOCUSid:8392

Trust: 0.6

db:NSFOCUSid:8393

Trust: 0.6

db:NSFOCUSid:8394

Trust: 0.6

db:APPLEid:APPLE-SA-2006-01-10

Trust: 0.6

db:FULLDISCid:20060112 FORTINET ADVISORY - APPLE QUICKTIME PLAYER STRIPBYTECOUNTS BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:BIDid:16869

Trust: 0.4

db:PACKETSTORMid:43078

Trust: 0.2

db:PACKETSTORMid:43077

Trust: 0.2

db:VULHUBid:VHN-14919

Trust: 0.1

db:PACKETSTORMid:42996

Trust: 0.1

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // VULHUB: VHN-14919 // BID: 16869 // BID: 16202 // PACKETSTORM: 42996 // PACKETSTORM: 43077 // PACKETSTORM: 43078 // CNNVD: CNNVD-200512-1000 // NVD: CVE-2005-3711

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=303101

Trust: 6.0

url:http://secunia.com/advisories/18370/

Trust: 4.1

url:http://www.securityfocus.com/bid/16202

Trust: 2.5

url:http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0442.html

Trust: 1.7

url:http://www.osvdb.org/22337

Trust: 1.7

url:http://securitytracker.com/id?1015465

Trust: 1.7

url:http://secunia.com/advisories/18370

Trust: 1.7

url:http://securitytracker.com/alerts/2006/jan/1015466.html

Trust: 1.6

url:http://www.securityfocus.com/archive/1/421831/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/421799/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/0128

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/24059

Trust: 1.1

url:http://www.eeye.com/html/research/advisories/ad20060111a.html

Trust: 0.8

url:http://www.osvdb.org/displayvuln.php?osvdb_id=22337

Trust: 0.8

url:http://www.eeye.com/html/research/advisories/ad20060111d.html

Trust: 0.8

url:http://www.eeye.com/html/research/advisories/ad20060111b.html

Trust: 0.8

url:http://developer.apple.com/documentation/quicktime/ref/refimporter.4.htm

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.6

url:/archive/1/421831

Trust: 0.6

url:/archive/1/421799

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/0128

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/24059

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/421831/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/421799/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/8392※8395※8394※8393

Trust: 0.6

url:/archive/1/421561

Trust: 0.3

url:/archive/1/421566

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3711

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2005-3711

Trust: 0.2

url:http://www.securityfocus.com/bid/16202/info

Trust: 0.2

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://www.apple.com/quicktime/download/win.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime704.html

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#921193 // CERT/CC: VU#115729 // CERT/CC: VU#150753 // CERT/CC: VU#913449 // CERT/CC: VU#687201 // VULHUB: VHN-14919 // BID: 16869 // BID: 16202 // PACKETSTORM: 42996 // PACKETSTORM: 43077 // PACKETSTORM: 43078 // CNNVD: CNNVD-200512-1000 // NVD: CVE-2005-3711

CREDITS

Dejun Meng vulnmonitor@fortinet.com

Trust: 0.6

sources: CNNVD: CNNVD-200512-1000

SOURCES

db:CERT/CCid:VU#921193
db:CERT/CCid:VU#115729
db:CERT/CCid:VU#150753
db:CERT/CCid:VU#913449
db:CERT/CCid:VU#687201
db:VULHUBid:VHN-14919
db:BIDid:16869
db:BIDid:16202
db:PACKETSTORMid:42996
db:PACKETSTORMid:43077
db:PACKETSTORMid:43078
db:CNNVDid:CNNVD-200512-1000
db:NVDid:CVE-2005-3711

LAST UPDATE DATE

2024-11-23T22:10:21.998000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#921193date:2006-01-12T00:00:00
db:CERT/CCid:VU#115729date:2006-01-11T00:00:00
db:CERT/CCid:VU#150753date:2006-01-13T00:00:00
db:CERT/CCid:VU#913449date:2006-01-31T00:00:00
db:CERT/CCid:VU#687201date:2006-01-20T00:00:00
db:VULHUBid:VHN-14919date:2018-10-19T00:00:00
db:BIDid:16869date:2008-05-01T19:06:00
db:BIDid:16202date:2008-05-01T18:56:00
db:CNNVDid:CNNVD-200512-1000date:2006-05-24T00:00:00
db:NVDid:CVE-2005-3711date:2024-11-21T00:02:29.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#921193date:2006-01-11T00:00:00
db:CERT/CCid:VU#115729date:2006-01-11T00:00:00
db:CERT/CCid:VU#150753date:2006-01-11T00:00:00
db:CERT/CCid:VU#913449date:2006-01-11T00:00:00
db:CERT/CCid:VU#687201date:2006-01-11T00:00:00
db:VULHUBid:VHN-14919date:2005-12-31T00:00:00
db:BIDid:16869date:2006-01-10T00:00:00
db:BIDid:16202date:2006-01-10T00:00:00
db:PACKETSTORMid:42996date:2006-01-12T00:49:01
db:PACKETSTORMid:43077date:2006-01-15T16:38:48
db:PACKETSTORMid:43078date:2006-01-15T16:41:28
db:CNNVDid:CNNVD-200512-1000date:2005-12-31T00:00:00
db:NVDid:CVE-2005-3711date:2005-12-31T05:00:00