|
|
|
|
| |
Credit:
The information has been provided by iDefense.
The original article can be found at:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=486
|
| |
Vulnerable Systems:
* QuickTime version 7.1.3 for Windows.
* Previous versions are suspected to be vulnerable.
The vulnerability specifically exists in QuickTime players handling of Video media atoms. When the 'Color table ID' field in the Video Sample Description is 0, QuickTime expects a color table to be present immediately after the description. A byte swap process is then performed on the memory following the description, regardless if a table is present or not. Heap corruption will occur in the case when the memory following the description is not part of the heap chunk being processed.
Exploitation allows an attacker to execute arbitrary code in the context of the current user.
In order to exploit this vulnerability, an attacker must persuade a victim into opening a specially crafted media file. This could be accomplished by either a direct link or referenced from a website under the attacker's control. No further interaction is required in the default configuration.
Vendor Status:
Apple has addressed this vulnerability by releasing version 7.1.5 of Quicktime.
More information can be found in Apple Advisory APPLE-SA-2007-03-05 at the following URL.
http://docs.info.apple.com/article.html?artnum=305149
CVE Information:
CVE-2007-0718
Disclosure Timeline:
* 12/06/2006 - Initial vendor notification
* 12/11/2007 - Initial vendor response
* 02/01/2007 - Second vendor notification
* 03/05/2007 - Coordinated public disclosure
|
|
|
|
|