|
|
|
|
| |
Credit:
The information has been provided by Apple Product Security.
The original article can be found at: http://support.apple.com/kb/HT1991
|
| |
Vulnerable Systems:
* QuickTime version 7.5
Immune Systems:
* QuickTime version 7.5.1
An issue in QuickTime's handling of PixData structures when processing a PICT image may result in a heap buffer overflow. Opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. This issue does not affect systems running Mac OS X. Credit to Dyon Balding of Secunia Research for reporting this issue.
Impact: Opening a maliciously crafted PICT image file may lead to an unexpected application termination or arbitrary code execution
CVE Information:
CVE-2008-1581
A memory corruption issue exists in QuickTime's handling of AAC-encoded media content. Opening a maliciously crafted media file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of media files. Credit to Dave Soldera of NGS Software, and Jens Alfke for reporting this issue.
Impact: Opening a maliciously crafted AAC-encoded media content may lead to an unexpected application termination or arbitrary code execution
CVE Information:
CVE-2008-1582
A heap buffer overflow exists in QuickTime's handling of PICT images. Opening a maliciously crafted PICT image file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Liam O Murchu of Symantec for reporting this issue.
Impact: Opening a maliciously crafted PICT image file may lead to an unexpected application termination or arbitrary code execution
CVE Information:
CVE-2008-1583
An issue in QuickTime's handling of Indeo video codec content may result in a stack buffer overflow. Viewing a maliciously crafted movie file with Indeo video codec content may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by not rendering Indeo video codec content. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.
Impact: Viewing maliciously crafted Indeo video media content may lead to an unexpected application termination or arbitrary code execution
CVE Information:
CVE-2008-1584
A URL handling issue exists in QuickTime's handling of file: URLs. This may allow arbitrary applications and files to be launched when a user plays maliciously crafted QuickTime content in QuickTime Player. This update addresses the issue by revealing files in Finder or Windows Explorer rather than launching them. Credit to Vinoo Thomas and Rahul Mohandas of McAfee Avert Labs, and Petko D. (pdp) Petkov of GNUCITIZEN working with TippingPoint's Zero Day Initiative for reporting this issue.
Impact: Playing maliciously crafted QuickTime content in QuickTime Player may lead to arbitrary code execution
CVE Information:
CVE-2008-1585
|
|
|
|
|