full-disclosure-uk May 2007 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: [Full-disclosure] TPTI-07-07: Apple QuickTim

[Full-disclosure] TPTI-07-07: Apple QuickTime STSD Parsing Heap Overflow Vulnerability

From: <TSRT_at_nospam>
Date: Fri May 11 2007 - 00:18:28 GMT
To: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com


TPTI-07-07: Apple QuickTime STSD Parsing Heap Overflow Vulnerability http://dvlabs.tippingpoint.com/advisory/TPTI-07-07 May 10, 2007

  • CVE ID: CVE-2007-0754
  • Affected Vendor: Apple
  • Affected Products: QuickTime Player 7.x
  • TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability since January 31, 2006 by Digital Vaccine protection filter ID 4109. For further product information on the TippingPoint IPS:

    http://www.tippingpoint.com

  • Vulnerability Details: This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of malformed Sample Table Sample Descriptor (STSD) atoms. Specifying a malicious atom size can result in an under allocated heap chunk and subsequently an exploitable heap corruption.

  • Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at:

    http://docs.info.apple.com/article.html?artnum=304357

  • Disclosure Timeline: 2006.06.16 - Vulnerability reported to vendor 2006.01.31 - Digital Vaccine released to TippingPoint customers 2007.05.10 - Coordinated public release of advisory
  • Credit: This vulnerability was discovered by Ganesh Devarajan, TippingPoint DVLabs.

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/