|
|
|
|
| |
Credit:
The information has been provided by Subreption LLC.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-231/
|
| |
Vulnerable Systems:
* Apple QuickTime
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within how the application parses a Matrix structure within a particular opcode embedded within a .pict file. When using this Matrix structure to transform image data, the application will miscalculate an index to represent a row of an object. This will cause the application to write outside the bounds of the array of objects which can lead to code execution under the context of the application.
Patch Availability:
Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT4723
CVE Information:
CVE-2010-3790
Disclosure Timeline:
2011-04-11 - Vulnerability reported to vendor
2011-06-29 - Coordinated public release of advisory
|
|
|
|
|