ID

VAR-200809-0045


CVE

CVE-2008-4116


TITLE

Apple QuickTime and iTunes Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2008-003437

DESCRIPTION

Buffer overflow in Apple QuickTime 7.5.5 and iTunes 8.0 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long type attribute in a quicktime tag (1) on a web page or embedded in a (2) .mp4 or (3) .mov file, possibly related to the Check_stack_cookie function and an off-by-one error that leads to a heap-based buffer overflow. (1) Web On the page quicktime tag (2) .mp4 Embedded in the file quicktime tag (3) .mov Embedded in the file quicktime tag. Apple QuickTime is prone to a buffer-overflow vulnerability. An attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted file. Successfully exploiting this issue allows remote attackers to cause the affected application to crash. Reportedly, code execution is not possible. This issue affects QuickTime 7.5.5; other versions may also be vulnerable. The <? quicktime type= ?> tag does not correctly handle the long attribute string. If the user uses Quicktime or Itunes media player to open the webpage or . A single-byte heap overflow can be triggered, resulting in a denial of service or the execution of arbitrary instructions

Trust: 1.98

sources: NVD: CVE-2008-4116 // JVNDB: JVNDB-2008-003437 // BID: 31212 // VULHUB: VHN-34241

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 2.4

vendor:applemodel:quicktimescope:eqversion:7.5.5

Trust: 2.4

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.3

sources: BID: 31212 // JVNDB: JVNDB-2008-003437 // CNNVD: CNNVD-200809-253 // NVD: CVE-2008-4116

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-4116
value: HIGH

Trust: 1.0

NVD: CVE-2008-4116
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-253
value: CRITICAL

Trust: 0.6

VULHUB: VHN-34241
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-4116
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-34241
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-34241 // JVNDB: JVNDB-2008-003437 // CNNVD: CNNVD-200809-253 // NVD: CVE-2008-4116

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-34241 // JVNDB: JVNDB-2008-003437 // NVD: CVE-2008-4116

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200809-253

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200809-253

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-003437

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-34241

PATCH

title:Top Pageurl:http://www.apple.com/itunes/

Trust: 0.8

sources: JVNDB: JVNDB-2008-003437

EXTERNAL IDS

db:NVDid:CVE-2008-4116

Trust: 2.8

db:BIDid:31212

Trust: 2.0

db:SREASONid:4270

Trust: 1.7

db:EXPLOIT-DBid:6471

Trust: 1.7

db:JVNDBid:JVNDB-2008-003437

Trust: 0.8

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:6113

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5936

Trust: 0.6

db:MILW0RMid:6471

Trust: 0.6

db:XFid:45311

Trust: 0.6

db:CNNVDid:CNNVD-200809-253

Trust: 0.6

db:SEEBUGid:SSVID-65713

Trust: 0.1

db:VULHUBid:VHN-34241

Trust: 0.1

sources: VULHUB: VHN-34241 // BID: 31212 // JVNDB: JVNDB-2008-003437 // CNNVD: CNNVD-200809-253 // NVD: CVE-2008-4116

REFERENCES

url:http://www.securityfocus.com/bid/31212

Trust: 1.7

url:http://securityreason.com/securityalert/4270

Trust: 1.7

url:https://www.exploit-db.com/exploits/6471

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5936

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6113

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7995

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/45311

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4116

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4116

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/45311

Trust: 0.6

url:http://www.milw0rm.com/exploits/6471

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:6113

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5936

Trust: 0.6

url:http://www.apple.com/quicktime/

Trust: 0.3

sources: VULHUB: VHN-34241 // BID: 31212 // JVNDB: JVNDB-2008-003437 // CNNVD: CNNVD-200809-253 // NVD: CVE-2008-4116

CREDITS

securfrog※ securfrog@gmail.com

Trust: 0.6

sources: CNNVD: CNNVD-200809-253

SOURCES

db:VULHUBid:VHN-34241
db:BIDid:31212
db:JVNDBid:JVNDB-2008-003437
db:CNNVDid:CNNVD-200809-253
db:NVDid:CVE-2008-4116

LAST UPDATE DATE

2024-11-23T22:43:11.120000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-34241date:2017-09-29T00:00:00
db:BIDid:31212date:2008-09-24T16:09:00
db:JVNDBid:JVNDB-2008-003437date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200809-253date:2009-03-04T00:00:00
db:NVDid:CVE-2008-4116date:2024-11-21T00:50:56.397

SOURCES RELEASE DATE

db:VULHUBid:VHN-34241date:2008-09-18T00:00:00
db:BIDid:31212date:2008-09-16T00:00:00
db:JVNDBid:JVNDB-2008-003437date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200809-253date:2008-09-18T00:00:00
db:NVDid:CVE-2008-4116date:2008-09-18T15:04:27.453