Release date:
Updated on:
Affected Systems:
Apple QuickTime Player 7.x
Unaffected system:
Apple QuickTime Player 7.7
Description:
--------------------------------------------------------------------------------
Bugtraq id: 49144
CVE (CAN) ID: CVE-2011-0257
QuickTime is a multimedia architecture developed by Apple Computer. It can process many digital videos, media paragraphs, sound effects, text, animations, music formats, and interactive panoramic images.
The stack buffer overflow vulnerability exists in the implementation of Apple QuickTime. Remote attackers can exploit this vulnerability to execute arbitrary code or cause a denial of service (DoS) with the current user permission.
This vulnerability is caused by Quicktime's PnSize PICT operation code processing method. It converts unsigned 16-bit values to the signed 32-bit values. This value is later used as the size parameter of the memory replication function for copying from a file to the stack. As a result, the stack buffer that allows remote code execution overflows.
<* Source: Matt 'j00ru 'Jurczyk
Link: http://www.zerodayinitiative.com/advisories/ZDI-11-252/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Apple
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://support.apple.com/