Check Point Advisories

Update IPS-1 with a Protection against Apple QuickTime and Apple QuickDraw Vulnerabilities

Check Point Reference: CPAI-2008-204
Date Published: 26 Feb 2008
Severity: Critical
Last Updated: Tuesday 01 January, 2008
Source:
Industry Reference:CVE-2007-2296
CVE-2007-0462
CVE-2007-4672
CVE-2007-4676
Protection Provided by:
Who is Vulnerable? Apple Quicktime 7.1.5 and other versions before 7.2
Apple Quicktime 7.1.3 and other applications on Mac OS X 10.4.8 and earlier
Apple QuickTime before 7.3
Vulnerability Description Several vulnerabilities have been identified within various versions of Apple QuickTime and Apple QuickDraw that, if exploited, would allow a remote attacker to execute arbitrary code on a vulnerable system.
Vulnerability DetailsInteger overflow in the FlipFileTypeAtom_BtoN function in Apple QuickTime 7.1.5, and other versions before 7.2, allows remote attackers to execute arbitrary code via a crafted M4V (MP4) file.

The _GetSrcBits32ARGB function in Apple QuickDraw, as used by QuickTime 7.1.3 and other applications on Mac OS X 10.4.8 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PICT image with a malformed Alpha RGB (ARGB) record, which triggers memory corruption.

Stack-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via an invalid UncompressedQuickTimeData opcode length in a PICT image.

Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via malformed elements when parsing (1) Poly type (0x0070 through 0x0074) and (2) PackBitsRgn field (0x0099) opcodes in a PICT image.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK