ID

VAR-201601-0140


CVE

CVE-2015-7087


TITLE

Apple QuickTime Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2015-006710

DESCRIPTION

Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, and CVE-2015-7117. Apple QuickTime is prone to multiple memory-corruption vulnerabilities. An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service conditions. Versions prior to Apple QuickTime 7.7.9 are vulnerable. The software is capable of handling multiple sources such as digital video, media segments, and more. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-01-07-1 QuickTime 7.7.9 [Re-sending with a valid signature] QuickTime 7.7.9 is now available and addresses the following: QuickTime Available for: Windows 7 and Windows Vista Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. CVE-ID CVE-2015-7085 : an anonymous researcher CVE-2015-7086 : an anonymous researcher CVE-2015-7087 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-7088 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-7089 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-7090 : Ryan Pentney and Richard Johnson of Cisco Talos CVE-2015-7091 : Pedro Ribeiro (pedrib@gmail.com) of Agile Information Security CVE-2015-7092 : Jaanus Kp Clarified Security working with HP's Zero Day Initiative CVE-2015-7117 : Ryan Pentney and Richard Johnson of Cisco Talos -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJWjxMiAAoJEBcWfLTuOo7t16wP/RNhjITSBZmBDZP61IOjKARD 5v69y+LkXLDNPlUkpB15Qjq3HDvZnFDwl3RSlZgAlQDO/GSqqWBnhsAEdO+5AAR1 LZqlVdERGHeeyfpuQ85waxf18O1dbg+R6SwM74SYRBXPujGQk9yT326I0X/EdXON 8upmGfzv8HvPsg712ei5YK8bumxsCh/LqM6TpA6oMF/bltaIbZ/OO3LNovZn9GQc 9taWVwP707FIjnJ7yKHzHnp6fH+79tqi5Dl0uZ7D446c7+B5ehPE7aUd29XqFrpE tgJzSDu2ZuVIz9RpC8Np+Bn8CSKqD6Kao7M5x4CVLWmpIYUpGKTIItUhvtXJ1jFY CyXXgse54w2ZG6hWE2gTmIvyn4/qVaSi8vlguEuk6IvA6kZeLdrc097OMPMPHlN/ I8T2A04Oj6rUsllf2uZih42nwve6CYpC9mh9/HLz0O+m0ue/L9HwIoto87OCmfi3 2RwyAoBLjMZUoOMLr9DjlQglQnTnNY8LjjZKRr9ug5V/tN8F051NeILDDj2vSf0q PI5JHoBD2LnJcxU+XI1JM/9amCYwBHjd94fcSp7H9BkdIzYshW4Deooc58EnjxVv 5hlwMIqqk2m911TsOjNpkVuysABoIB8hX3el3py4V+3sLoM5cVYa+FNS7+FGzG47 UJ/4c68fdMRAbGx4KfoW =ERtQ -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2015-7087 // JVNDB: JVNDB-2015-006710 // BID: 80020 // VULHUB: VHN-85048 // PACKETSTORM: 135183

AFFECTED PRODUCTS

vendor:applemodel:quicktimescope:lteversion:7.7.8

Trust: 1.0

vendor:applemodel:quicktimescope:ltversion:7.7.9 (windows 7/windows vista)

Trust: 0.8

vendor:applemodel:quicktimescope:eqversion:7.7.8

Trust: 0.6

vendor:applemodel:quicktime playerscope:eqversion:7.7.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.8

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.7

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.7.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.7

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6.9

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.4

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:7.7.9

Trust: 0.3

sources: BID: 80020 // JVNDB: JVNDB-2015-006710 // CNNVD: CNNVD-201601-158 // NVD: CVE-2015-7087

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7087
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-7087
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201601-158
value: MEDIUM

Trust: 0.6

VULHUB: VHN-85048
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7087
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-85048
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7087
baseSeverity: MEDIUM
baseScore: 6.6
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 4.7
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-85048 // JVNDB: JVNDB-2015-006710 // CNNVD: CNNVD-201601-158 // NVD: CVE-2015-7087

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-85048 // JVNDB: JVNDB-2015-006710 // NVD: CVE-2015-7087

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-158

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201601-158

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006710

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-01-07-1 QuickTime 7.7.9url:http://lists.apple.com/archives/security-announce/2016/Jan/msg00000.html

Trust: 0.8

title:HT205638url:https://support.apple.com/en-us/HT205638

Trust: 0.8

title:HT205638url:https://support.apple.com/ja-jp/HT205638

Trust: 0.8

title:Apple QuickTime Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59512

Trust: 0.6

sources: JVNDB: JVNDB-2015-006710 // CNNVD: CNNVD-201601-158

EXTERNAL IDS

db:NVDid:CVE-2015-7087

Trust: 2.9

db:SECTRACKid:1034610

Trust: 1.1

db:JVNDBid:JVNDB-2015-006710

Trust: 0.8

db:CNNVDid:CNNVD-201601-158

Trust: 0.7

db:BIDid:80020

Trust: 0.3

db:VULHUBid:VHN-85048

Trust: 0.1

db:PACKETSTORMid:135183

Trust: 0.1

sources: VULHUB: VHN-85048 // BID: 80020 // JVNDB: JVNDB-2015-006710 // PACKETSTORM: 135183 // CNNVD: CNNVD-201601-158 // NVD: CVE-2015-7087

REFERENCES

url:http://lists.apple.com/archives/security-announce/2016/jan/msg00000.html

Trust: 1.7

url:https://support.apple.com/ht205638

Trust: 1.7

url:http://www.securitytracker.com/id/1034610

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7087

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7087

Trust: 0.8

url:http://www.apple.com/quicktime/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-7091

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7087

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7092

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7089

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7117

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7090

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7085

Trust: 0.1

sources: VULHUB: VHN-85048 // BID: 80020 // JVNDB: JVNDB-2015-006710 // PACKETSTORM: 135183 // CNNVD: CNNVD-201601-158 // NVD: CVE-2015-7087

CREDITS

Ryan Pentney and Richard Johnson of Cisco Talos, Pedro Ribeiroof Agile Information Security, Jaanus Kp Clarified Security working with HP's Zero Day Initiative and an anonymous researcher

Trust: 0.3

sources: BID: 80020

SOURCES

db:VULHUBid:VHN-85048
db:BIDid:80020
db:JVNDBid:JVNDB-2015-006710
db:PACKETSTORMid:135183
db:CNNVDid:CNNVD-201601-158
db:NVDid:CVE-2015-7087

LAST UPDATE DATE

2025-04-13T23:03:24.623000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-85048date:2016-12-07T00:00:00
db:BIDid:80020date:2016-02-02T20:26:00
db:JVNDBid:JVNDB-2015-006710date:2016-01-12T00:00:00
db:CNNVDid:CNNVD-201601-158date:2016-01-11T00:00:00
db:NVDid:CVE-2015-7087date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-85048date:2016-01-09T00:00:00
db:BIDid:80020date:2016-01-07T00:00:00
db:JVNDBid:JVNDB-2015-006710date:2016-01-12T00:00:00
db:PACKETSTORMid:135183date:2016-01-08T15:15:28
db:CNNVDid:CNNVD-201601-158date:2016-01-11T00:00:00
db:NVDid:CVE-2015-7087date:2016-01-09T02:59:03.737