ID

VAR-200605-0593


CVE

CVE-2006-2238


TITLE

Apple QuickTime BMP Graphics Stack overflow vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200605-258

DESCRIPTION

Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted BMP file that triggers the overflow in the ReadBMP function. NOTE: this issue was originally included as item 3 in CVE-2006-1983, but it has been given a separate identifier because it is a distinct issue. Multiple integer-overflow and buffer-overflow vulnerabilities affect QuickTime. These issues affect both Mac OS X and Microsoft Windows releases of the software. Successful exploits will result in the execution of arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely cause denial-of-service conditions. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. Apple QuickTime exists based on a stack buffer overflow. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-132B Apple QuickTime Vulnerabilities Original release date: May 12, 2006 Last revised: -- Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows Overview Apple QuickTime contains multiple vulnerabilities. I. Description Apple QuickTime 7.1 resolves multiple vulnerabilities in the way different types of image and media files are handled. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted image or media file with a vulnerable version of QuickTime. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page. For more information, please refer to the Vulnerability Notes. II. Impact The impacts of these vulnerabilities could allow an remote, unauthenticated attacker to execute arbitrary code or commands, and cause a denial-of-service condition. For further information, please see the Vulnerability Notes. III. Disable QuickTime in your web browser An attacker may be able to exploit this vulnerability by persuading a user to access a specially crafted file with a web browser. Disabling QuickTime in your web browser will defend against this attack vector. For more information, refer to the Securing Your Web Browser document. Appendix A. References * Vulnerability Notes for QuickTime 7.1 - <http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_7.1> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * About the security content of the QuickTime 7.1 Update - <http://docs.info.apple.com/article.html?artnum=303752> * Apple QuickTime 7.1 - <http://www.apple.com/support/downloads/quicktime71.html> * Standalone Apple QuickTime Player - <http://www.apple.com/quicktime/download/standalone.html> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-132B.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-132B Feedback VU#289705" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History May 12, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRGT7JH0pj593lg50AQI2Uwf/U3zGDrR8UkWK4ry6AYMS7HPMdbiF6Vmo 9gP9Luc6Kj8zzxCWhnNKNzEq2P0B1oD03WcPFaIPnwvQJGApeUDRimyhQj8RDjME yAUt/reWG7RZ0Z2w/qaiZP7pQ7SjyIUKkN2OCG8LMmGKqsiCdFXoss/Bu0yFMH11 uvgwibfvkOdRLAPmRTVWk+gJEAdw3xFySm9r92qmig6CxKi7GAIpi9Gf7MXcRsKg oG3y5f06Kiq8ACYszPKneHE7WNvLP1ewuaWmf7PHiNebAB+W5hfwA2yEh6e6PSV2 eBi5cpigfXBrsjXk4L7wYrD8UcRl7nN8iqzWpMwYJkSloUmcYL1BBg== =LsFu -----END PGP SIGNATURE----- . TITLE: QuickTime Multiple Code Execution Vulnerabilities SECUNIA ADVISORY ID: SA20069 VERIFY ADVISORY: http://secunia.com/advisories/20069/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Apple Quicktime 4.x http://secunia.com/product/7923/ Apple Quicktime 5.x http://secunia.com/product/215/ Apple Quicktime 6.x http://secunia.com/product/810/ Apple QuickTime 7.x http://secunia.com/product/5090/ DESCRIPTION: Multiple vulnerabilities have been reported in QuickTime, which can be exploited by malicious people to compromise a user's system. 3) A boundary error within the processing of Flash movies can be exploited via a specially crafted Flash movie to crash the application and potentially execute arbitrary code. 4) An integer overflow and boundary error within the processing of H.264 movies can be exploited via a specially crafted H.264 movie to crash the application and potentially execute arbitrary code. 5) A boundary error within the processing of MPEG4 movies can be exploited via a specially crafted MPEG4 movie to crash the application and potentially execute arbitrary code. 6) An integer overflow error within the processing of FlashPix images (".fpx") can be exploited via a specially crafted FlashPix image with an overly large value in the field specifying the number of data blocks in the file. 7) A boundary error within the processing of AVI movies can be exploited via a specially crafted AVI movie to crash the application and potentially execute arbitrary code. 8) Two boundary errors within the processing of PICT images can be exploited to either cause a stack-based via a PICT image with specially crafted font information or a heap-based buffer overflow via a PICT image with specially crafted image data. This can be exploited to crash the application and potentially execute arbitrary code. SOLUTION: Update to version 7.1. http://www.apple.com/support/downloads/quicktime71.html PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor. 2) Mike Price of McAfee AVERT Labs and Sowhat of Nevis Labs. 3) Mike Price, McAfee AVERT Labs. 4) Mike Price of McAfee AVERT Labs and ATmaCA. 5) Mike Price, McAfee AVERT Labs. 6) Fang Xing of eEye Digital Security and Mike Price of McAfee AVERT Labs. 7) Mike Price, McAfee AVERT Labs. 8) Mike Price, McAfee AVERT Labs. 9) Tom Ferris ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=303752 eEye Digital Security: http://www.eeye.com/html/research/advisories/AD20060511.html Zero Day Initiative: http://www.zerodayinitiative.com/advisories/ZDI-06-015.html Sowhat: http://secway.org/advisory/AD20060512.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.44

sources: NVD: CVE-2006-2238 // BID: 17953 // VULHUB: VHN-18346 // PACKETSTORM: 46427 // PACKETSTORM: 46260

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:eqversion:7.0.3

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:quicktimescope:eqversion:7.0

Trust: 1.6

vendor:applemodel:quicktimescope:lteversion:7.0.4

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:7.0.4

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.1

Trust: 0.3

sources: BID: 17953 // CNNVD: CNNVD-200605-258 // NVD: CVE-2006-2238

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2238
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200605-258
value: HIGH

Trust: 0.6

VULHUB: VHN-18346
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-2238
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-18346
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18346 // CNNVD: CNNVD-200605-258 // NVD: CVE-2006-2238

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-18346 // NVD: CVE-2006-2238

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 46427 // CNNVD: CNNVD-200605-258

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200605-258

EXTERNAL IDS

db:BIDid:17953

Trust: 2.0

db:NVDid:CVE-2006-2238

Trust: 2.0

db:SECUNIAid:20069

Trust: 1.9

db:USCERTid:TA06-132B

Trust: 1.8

db:OSVDBid:24820

Trust: 1.7

db:SECTRACKid:1016067

Trust: 1.7

db:VUPENid:ADV-2006-1778

Trust: 1.7

db:CNNVDid:CNNVD-200605-258

Trust: 0.7

db:APPLEid:APPLE-SA-2006-05-11

Trust: 0.6

db:XFid:26402

Trust: 0.6

db:CERT/CCid:TA06-132B

Trust: 0.6

db:VULHUBid:VHN-18346

Trust: 0.1

db:PACKETSTORMid:46427

Trust: 0.1

db:ZDIid:ZDI-06-015

Trust: 0.1

db:PACKETSTORMid:46260

Trust: 0.1

sources: VULHUB: VHN-18346 // BID: 17953 // PACKETSTORM: 46427 // PACKETSTORM: 46260 // CNNVD: CNNVD-200605-258 // NVD: CVE-2006-2238

REFERENCES

url:http://lists.apple.com/archives/security-announce/2006/may/msg00002.html

Trust: 1.7

url:http://www.securityfocus.com/bid/17953

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta06-132b.html

Trust: 1.7

url:http://www.security-protocols.com/sp-x27-advisory.php

Trust: 1.7

url:http://www.osvdb.org/24820

Trust: 1.7

url:http://securitytracker.com/id?1016067

Trust: 1.7

url:http://secunia.com/advisories/20069

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/1778

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26402

Trust: 1.1

url:http://www.frsirt.com/english/advisories/2006/1778

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26402

Trust: 0.6

url:http://docs.info.apple.com/article.html?artnum=303752

Trust: 0.4

url:http://www.apple.com/quicktime/

Trust: 0.3

url:/archive/1/433850

Trust: 0.3

url:/archive/1/433810

Trust: 0.3

url:/archive/1/433828

Trust: 0.3

url:http://www.apple.com/quicktime/download/standalone.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=quicktime_7.1>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=303752>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-132b.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime71.html>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://www.apple.com/support/downloads/quicktime71.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5090/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-06-015.html

Trust: 0.1

url:http://secway.org/advisory/ad20060512.txt

Trust: 0.1

url:http://secunia.com/product/810/

Trust: 0.1

url:http://secunia.com/advisories/20069/

Trust: 0.1

url:http://www.eeye.com/html/research/advisories/ad20060511.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/7923/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/215/

Trust: 0.1

sources: VULHUB: VHN-18346 // BID: 17953 // PACKETSTORM: 46427 // PACKETSTORM: 46260 // CNNVD: CNNVD-200605-258 // NVD: CVE-2006-2238

CREDITS

Mike Price ATmaCA atmaca@atmacasoft.com http://www.zerodayinitiative.com/ Sowhat smaillist@gmail.com

Trust: 0.6

sources: CNNVD: CNNVD-200605-258

SOURCES

db:VULHUBid:VHN-18346
db:BIDid:17953
db:PACKETSTORMid:46427
db:PACKETSTORMid:46260
db:CNNVDid:CNNVD-200605-258
db:NVDid:CVE-2006-2238

LAST UPDATE DATE

2024-08-14T12:33:04.450000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18346date:2017-07-20T00:00:00
db:BIDid:17953date:2006-05-15T22:29:00
db:CNNVDid:CNNVD-200605-258date:2006-05-24T00:00:00
db:NVDid:CVE-2006-2238date:2017-07-20T01:31:17.770

SOURCES RELEASE DATE

db:VULHUBid:VHN-18346date:2006-05-12T00:00:00
db:BIDid:17953date:2006-05-11T00:00:00
db:PACKETSTORMid:46427date:2006-05-22T00:50:08
db:PACKETSTORMid:46260date:2006-05-17T05:39:52
db:CNNVDid:CNNVD-200605-258date:2005-11-07T00:00:00
db:NVDid:CVE-2006-2238date:2006-05-12T21:02:00