ID

VAR-200705-0516


CVE

CVE-2007-2388


TITLE

Apple QuickTime for Java information disclosure vulnerability

Trust: 0.8

sources: CERT/CC: VU#434748

DESCRIPTION

Apple QuickTime for Java 7.1.6 on Mac OS X and Windows does not properly restrict QTObject subclassing, which allows remote attackers to execute arbitrary code via a web page containing a user-defined class that accesses unsafe functions that can be leveraged to write to arbitrary memory locations. Apple QuickTime for Java fails to properly clear memory. As a result, sensitive information may be exposed to unintended parties. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Apple QuickTime for Java is prone to a remote heap-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input prior to copying it to an insufficiently sized buffer. Failed exploit attempts will result in a denial of service. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There is a loophole in the implementation of QuickTime, and a remote attacker may take advantage of this loophole to control the user's machine. If a user is tricked into visiting a Web page containing a specially crafted Java Applet, a heap overflow may be triggered, resulting in the execution of arbitrary instructions

Trust: 3.42

sources: NVD: CVE-2007-2388 // CERT/CC: VU#434748 // CERT/CC: VU#995836 // JVNDB: JVNDB-2007-001937 // BID: 24221 // VULHUB: VHN-25750

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 1.6

vendor:applemodel:mac os xscope: - version: -

Trust: 1.4

vendor:applemodel:quicktimescope:eqversion:7.1.6

Trust: 1.0

vendor:applemodel:quicktimescope:eqversion:java edition 7.1.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.0.4

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.1

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.0.1

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.1.1

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.1.3

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.1.2

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.0

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.0.3

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.0.2

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

sources: CERT/CC: VU#434748 // CERT/CC: VU#995836 // BID: 24221 // JVNDB: JVNDB-2007-001937 // CNNVD: CNNVD-200705-501 // NVD: CVE-2007-2388

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2388
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#434748
value: 2.97

Trust: 0.8

CARNEGIE MELLON: VU#995836
value: 14.11

Trust: 0.8

NVD: CVE-2007-2388
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200705-501
value: CRITICAL

Trust: 0.6

VULHUB: VHN-25750
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2388
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25750
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#434748 // CERT/CC: VU#995836 // VULHUB: VHN-25750 // JVNDB: JVNDB-2007-001937 // CNNVD: CNNVD-200705-501 // NVD: CVE-2007-2388

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-25750 // JVNDB: JVNDB-2007-001937 // NVD: CVE-2007-2388

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200705-501

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200705-501

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001937

PATCH

title:APPLE-SA-2007-05-29url:http://lists.apple.com/archives/security-announce/2007/May/msg00005.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-001937

EXTERNAL IDS

db:CERT/CCid:VU#995836

Trust: 3.6

db:SECUNIAid:25130

Trust: 3.3

db:NVDid:CVE-2007-2388

Trust: 2.8

db:BIDid:24221

Trust: 2.0

db:OSVDBid:35576

Trust: 1.7

db:SECTRACKid:1018136

Trust: 1.7

db:VUPENid:ADV-2007-1974

Trust: 1.7

db:CERT/CCid:VU#434748

Trust: 0.8

db:JVNDBid:JVNDB-2007-001937

Trust: 0.8

db:APPLEid:APPLE-SA-2007-05-29

Trust: 0.6

db:CNNVDid:CNNVD-200705-501

Trust: 0.6

db:VULHUBid:VHN-25750

Trust: 0.1

sources: CERT/CC: VU#434748 // CERT/CC: VU#995836 // VULHUB: VHN-25750 // BID: 24221 // JVNDB: JVNDB-2007-001937 // CNNVD: CNNVD-200705-501 // NVD: CVE-2007-2388

REFERENCES

url:http://secunia.com/advisories/25130/

Trust: 3.2

url:http://www.kb.cert.org/vuls/id/995836

Trust: 2.8

url:http://docs.info.apple.com/article.html?artnum=305531

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2007/may/msg00005.html

Trust: 1.7

url:http://www.securityfocus.com/bid/24221

Trust: 1.7

url:http://secunia.com/secunia_research/2007-52/advisory/

Trust: 1.7

url:http://www.osvdb.org/35576

Trust: 1.7

url:http://www.securitytracker.com/id?1018136

Trust: 1.7

url:http://secunia.com/advisories/25130

Trust: 1.7

url:http://docs.info.apple.com/article.html?artnum=304263

Trust: 1.6

url:http://www.apple.com/support/downloads/

Trust: 1.6

url:http://www.vupen.com/english/advisories/2007/1974

Trust: 1.1

url:http://developer.apple.com/quicktime/qtjava/

Trust: 0.8

url:http://developer.apple.com/quicktime/qtjava/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2388

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-2388

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/1974

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

sources: CERT/CC: VU#434748 // CERT/CC: VU#995836 // VULHUB: VHN-25750 // BID: 24221 // JVNDB: JVNDB-2007-001937 // CNNVD: CNNVD-200705-501 // NVD: CVE-2007-2388

CREDITS

John McDonaldPaul GriswoldTom CrossDyon Baldin

Trust: 0.6

sources: CNNVD: CNNVD-200705-501

SOURCES

db:CERT/CCid:VU#434748
db:CERT/CCid:VU#995836
db:VULHUBid:VHN-25750
db:BIDid:24221
db:JVNDBid:JVNDB-2007-001937
db:CNNVDid:CNNVD-200705-501
db:NVDid:CVE-2007-2388

LAST UPDATE DATE

2024-11-23T22:14:57.392000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#434748date:2007-05-30T00:00:00
db:CERT/CCid:VU#995836date:2007-05-30T00:00:00
db:VULHUBid:VHN-25750date:2011-05-18T00:00:00
db:BIDid:24221date:2007-05-30T16:01:00
db:JVNDBid:JVNDB-2007-001937date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200705-501date:2007-06-14T00:00:00
db:NVDid:CVE-2007-2388date:2024-11-21T00:30:39.827

SOURCES RELEASE DATE

db:CERT/CCid:VU#434748date:2007-05-30T00:00:00
db:CERT/CCid:VU#995836date:2007-05-30T00:00:00
db:VULHUBid:VHN-25750date:2007-05-29T00:00:00
db:BIDid:24221date:2007-05-29T00:00:00
db:JVNDBid:JVNDB-2007-001937date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200705-501date:2007-05-29T00:00:00
db:NVDid:CVE-2007-2388date:2007-05-29T21:30:00