VAR-200806-0184

Vulnerability from variot - Updated: 2025-04-10 22:57

Heap-based buffer overflow in Apple QuickTime before 7.5 on Windows allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted packed scanlines in PixData structures in a PICT image. Apple QuickTime does not properly handle "file: URLs" which may allow an attacker to execute arbitrary code. These issues arise when the application handles specially crafted PICT image files, Indeo video content, movie files, 'file:' URIs, and AAC-encoded media. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user; failed exploits will cause denial-of-service conditions. Versions prior to QuickTime 7.5 are affected. An attacker can exploit this issue to execute arbitrary within the context of the affected application. Failed exploit attempts will result in a denial-of-service vulnerability. If the user is tricked into opening a malicious PICT graphics, it will cause the player to terminate or execute arbitrary instructions. ----------------------------------------------------------------------

Want a new job?

http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/

International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/


TITLE: Apple QuickTime Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA29293

VERIFY ADVISORY: http://secunia.com/advisories/29293/

CRITICAL: Highly critical

IMPACT: System access

WHERE:

From remote

SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/

DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

5) An error in the handling of "file:" URLs can be exploited to e.g. execute arbitrary programs when playing specially crafted QuickTIme content in QuickTime Player.

SOLUTION: Update to version 7.5 (via Software Update or Apple Downloads. See vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: 1) Dyon Balding, Secunia Research 2) Independently discovered by: * Dave Soldera, NGS Software * Jens Alfke 3) Liam O Murchu, Symantec 4) An anonymous researcher, reported via ZDI 5) Independently discovered by: * Vinoo Thomas and Rahul Mohandas, McAfee Avert Labs * Petko D. (pdp) Petkov, GNUCITIZEN

ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT1991

Secunia Research: http://secunia.com/secunia_research/2008-9/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

     National Cyber Alert System

Technical Cyber Security Alert TA08-162C

Apple Quicktime Updates for Multiple Vulnerabilities

Original release date: June 10, 2008 Last revised: -- Source: US-CERT

Systems Affected

 * Apple Mac OS X running versions of QuickTime prior to 7.5
 * Microsoft Windows running versions of QuickTime prior to 7.5

Overview

Apple QuickTime contains multiple vulnerabilities as described in the Apple Knowledgebase article HT1991.

I. Apple QuickTime 7.5 addresses these vulnerabilities.

II. For further information, please see Apple knowledgebase article HT1991 about the security content of QuickTime 7.5

III. Solution

Upgrade QuickTime

Upgrade to QuickTime 7.5. This and other updates for Mac OS X are available via Apple Update.

Secure your web browser

To help mitigate these and other vulnerabilities that can be exploited via a web browser, refer to Securing Your Web Browser.

IV. References

 * About   the  security  content  of  the  QuickTime  7.5  Update  -
   <http://support.apple.com/kb/HT1991>

 * How to tell if Software Update for Windows is working correctly when no
   updates are available -
   <http://docs.info.apple.com/article.html?artnum=304263>

 * Apple - QuickTime - Download -
   <http://www.apple.com/quicktime/download/>

 * Mac OS X: Updating your software -
   <http://docs.info.apple.com/article.html?artnum=106704>

 * Securing Your Web Browser -
   <http://www.us-cert.gov/reading_room/securing_browser/>

 * US-CERT     Vulnerability    Notes    for    QuickTime    7.5    -
   <http://www.kb.cert.org/vuls/byid?searchview&query=apple_quicktime_7.5>

The most recent version of this document can be found at:

 <http://www.us-cert.gov/cas/techalerts/TA08-162C.html>

Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA08-162C Feedback VU#132419" in the subject.


For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.


Produced 2008 by US-CERT, a government organization.

Terms of use:

 <http://www.us-cert.gov/legal.html>

Revision History

June 10, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSE7bhHIHljM+H4irAQKGtQf/bW1M/gN6V35MDqIGFK3PbaIXBqnhtFws xPl6zNdWmYVCHid6u0aZ+UYE+AESK3Qw3DdiwLRr3X9R4hoGmRUGiedv4h0owQTb Rij3K5simf2vbNBsVopFNeVnokOowkcRYUk/n0QnGn5FUnwDeKutrMwXQ94As/Y3 8z/VsKpwqjScHgedT6Hv67f8E6kSma4BBcK2NlRC9VMTWN2oUD7MDI/BSp5kcqaM TJfBJzqsWUywWRP3Bi8PYOLYbmC5Qj7nirl0lzCjJdNiS/GKUnT4LezHTlVhVOv5 FTnkO25morpDQph2+oBi6o+lCOBu6G6RtfQ7u15CGDCeZyme2B79eg== =e01A -----END PGP SIGNATURE----- .

====================================================================== 6) Time Table

10/03/2008 - Vendor notified. 13/03/2008 - Vendor response. 10/06/2008 - Public disclosure.

====================================================================== 7) Credits

Discovered by Dyon Balding, Secunia Research.

====================================================================== 8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-1581 for the vulnerability.

====================================================================== 9) About Secunia

Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:

http://corporate.secunia.com/

Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.

http://secunia.com/

Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:

http://corporate.secunia.com/secunia_research/33/

Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:

http://secunia.com/secunia_vacancies/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

====================================================================== 10) Verification

Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-9/

Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/

======================================================================

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200806-0184",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "quicktime",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "7.4.5"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "quicktime",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "apple",
        "version": "7.5"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.0.3"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.1.4"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.1.2"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.4.1"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.1.5"
      },
      {
        "model": "quicktime player",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.5"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.2"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.3.1.70"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.4"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.3"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.1.6"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.3.1"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.1.3"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.0.4"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.1.1"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.1"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.4.5"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.0.2"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "7.0.1"
      },
      {
        "model": "windows vista",
        "scope": null,
        "trust": 0.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "windows xp",
        "scope": null,
        "trust": 0.6,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "db": "BID",
        "id": "29619"
      },
      {
        "db": "BID",
        "id": "29649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:apple:quicktime",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dyon BaldingDave SolderaRahul Mohandas",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-1581",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2008-1581",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-31706",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-1581",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#132419",
            "trust": 0.8,
            "value": "18.25"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-1581",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200806-141",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-31706",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in Apple QuickTime before 7.5 on Windows allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted packed scanlines in PixData structures in a PICT image. Apple QuickTime does not properly handle \"file: URLs\" which may allow an attacker to execute arbitrary code. \nThese issues arise when the application handles specially crafted PICT image files, Indeo video content, movie files, \u0027file:\u0027 URIs, and AAC-encoded media. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user; failed exploits will cause denial-of-service conditions. \nVersions prior to QuickTime 7.5 are affected. \nAn attacker can exploit this issue to execute arbitrary within the context of the affected application. Failed exploit attempts will result in a denial-of-service vulnerability. If the user is tricked into opening a malicious PICT graphics, it will cause the player to terminate or execute arbitrary instructions. ----------------------------------------------------------------------\n\nWant a new job?\n\nhttp://secunia.com/secunia_security_specialist/\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\nInternational Partner Manager - Project Sales in the IT-Security\nIndustry:\nhttp://corporate.secunia.com/about_secunia/64/\n\n----------------------------------------------------------------------\n\nTITLE:\nApple QuickTime Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA29293\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/29293/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nApple QuickTime 7.x\nhttp://secunia.com/product/5090/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Apple QuickTime, which can\nbe exploited by malicious people to compromise a user\u0027s system. \n\n5) An error in the handling of \"file:\" URLs can be exploited to e.g. \nexecute arbitrary programs when playing specially crafted QuickTIme\ncontent in QuickTime Player. \n\nSOLUTION:\nUpdate to version 7.5 (via Software Update or Apple Downloads. See\nvendor\u0027s advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\n1) Dyon Balding, Secunia Research\n2) Independently discovered by:\n* Dave Soldera, NGS Software\n* Jens Alfke\n3) Liam O Murchu, Symantec\n4) An anonymous researcher, reported via ZDI\n5) Independently discovered by:\n* Vinoo Thomas and Rahul Mohandas, McAfee Avert Labs\n* Petko D. (pdp) Petkov, GNUCITIZEN\n\nORIGINAL ADVISORY:\nApple:\nhttp://support.apple.com/kb/HT1991\n\nSecunia Research:\nhttp://secunia.com/secunia_research/2008-9/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n         National Cyber Alert System\n\n   Technical Cyber Security Alert TA08-162C\n\n\nApple Quicktime Updates for Multiple Vulnerabilities\n\n   Original release date: June 10, 2008\n   Last revised: --\n   Source: US-CERT\n\n\nSystems Affected\n\n     * Apple Mac OS X running versions of QuickTime prior to 7.5\n     * Microsoft Windows running versions of QuickTime prior to 7.5\n\n\nOverview\n\n   Apple QuickTime contains multiple vulnerabilities as described in the Apple\n   Knowledgebase article HT1991. \n\n\nI. Apple QuickTime 7.5 addresses these\n   vulnerabilities. \n\n\nII. For further\n   information,  please  see Apple knowledgebase article HT1991 about the\n   security content of QuickTime 7.5\n\n\nIII. Solution\n\nUpgrade QuickTime\n\n   Upgrade to QuickTime 7.5. This and other updates for Mac OS X are available\n   via Apple Update. \n\nSecure your web browser\n\n   To help mitigate these and other vulnerabilities that can be exploited via a\n   web browser, refer to Securing Your Web Browser. \n\n\nIV. References\n\n     * About   the  security  content  of  the  QuickTime  7.5  Update  -\n       \u003chttp://support.apple.com/kb/HT1991\u003e\n\n     * How to tell if Software Update for Windows is working correctly when no\n       updates are available -\n       \u003chttp://docs.info.apple.com/article.html?artnum=304263\u003e\n\n     * Apple - QuickTime - Download -\n       \u003chttp://www.apple.com/quicktime/download/\u003e\n\n     * Mac OS X: Updating your software -\n       \u003chttp://docs.info.apple.com/article.html?artnum=106704\u003e\n\n     * Securing Your Web Browser -\n       \u003chttp://www.us-cert.gov/reading_room/securing_browser/\u003e\n\n     * US-CERT     Vulnerability    Notes    for    QuickTime    7.5    -\n       \u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=apple_quicktime_7.5\u003e\n\n____________________________________________________________________\n\n   The most recent version of this document can be found at:\n\n     \u003chttp://www.us-cert.gov/cas/techalerts/TA08-162C.html\u003e\n ____________________________________________________________________\n\n   Feedback can be directed to US-CERT Technical Staff. Please send\n   email to \u003ccert@cert.org\u003e with \"TA08-162C Feedback VU#132419\" in the\n   subject. \n ____________________________________________________________________\n\n   For instructions on subscribing to or unsubscribing from this\n   mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n   Produced 2008 by US-CERT, a government organization. \n\n   Terms of use:\n\n     \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\n   Revision History\n\n   June 10, 2008: Initial release\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (GNU/Linux)\n\niQEVAwUBSE7bhHIHljM+H4irAQKGtQf/bW1M/gN6V35MDqIGFK3PbaIXBqnhtFws\nxPl6zNdWmYVCHid6u0aZ+UYE+AESK3Qw3DdiwLRr3X9R4hoGmRUGiedv4h0owQTb\nRij3K5simf2vbNBsVopFNeVnokOowkcRYUk/n0QnGn5FUnwDeKutrMwXQ94As/Y3\n8z/VsKpwqjScHgedT6Hv67f8E6kSma4BBcK2NlRC9VMTWN2oUD7MDI/BSp5kcqaM\nTJfBJzqsWUywWRP3Bi8PYOLYbmC5Qj7nirl0lzCjJdNiS/GKUnT4LezHTlVhVOv5\nFTnkO25morpDQph2+oBi6o+lCOBu6G6RtfQ7u15CGDCeZyme2B79eg==\n=e01A\n-----END PGP SIGNATURE-----\n. \n\n====================================================================== \n6) Time Table \n\n10/03/2008 - Vendor notified. \n13/03/2008 - Vendor response. \n10/06/2008 - Public disclosure. \n\n====================================================================== \n7) Credits \n\nDiscovered by Dyon Balding, Secunia Research. \n\n====================================================================== \n8) References\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned \nCVE-2008-1581 for the vulnerability. \n\n====================================================================== \n9) About Secunia\n\nSecunia offers vulnerability management solutions to corporate\ncustomers with verified and reliable vulnerability intelligence\nrelevant to their specific system configuration:\n\nhttp://corporate.secunia.com/\n\nSecunia also provides a publicly accessible and comprehensive advisory\ndatabase as a service to the security community and private \nindividuals, who are interested in or concerned about IT-security. \n\nhttp://secunia.com/\n\nSecunia believes that it is important to support the community and to\ndo active vulnerability research in order to aid improving the \nsecurity and reliability of software in general:\n\nhttp://corporate.secunia.com/secunia_research/33/\n\nSecunia regularly hires new skilled team members. Check the URL below \nto see currently vacant positions:\n\nhttp://secunia.com/secunia_vacancies/\n\nSecunia offers a FREE mailing list called Secunia Security Advisories:\n\nhttp://secunia.com/secunia_security_advisories/ \n\n====================================================================== \n10) Verification \n\nPlease verify this advisory by visiting the Secunia website:\nhttp://secunia.com/secunia_research/2008-9/\n\nComplete list of vulnerability reports published by Secunia Research:\nhttp://secunia.com/secunia_research/\n\n======================================================================\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-1581"
      },
      {
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "db": "BID",
        "id": "29619"
      },
      {
        "db": "BID",
        "id": "29649"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "db": "PACKETSTORM",
        "id": "67149"
      },
      {
        "db": "PACKETSTORM",
        "id": "67176"
      },
      {
        "db": "PACKETSTORM",
        "id": "67152"
      }
    ],
    "trust": 3.24
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-31706",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-1581",
        "trust": 3.2
      },
      {
        "db": "BID",
        "id": "29619",
        "trust": 2.8
      },
      {
        "db": "USCERT",
        "id": "TA08-162C",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "29293",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1020213",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "29649",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-1776",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "42943",
        "trust": 1.4
      },
      {
        "db": "CERT/CC",
        "id": "VU#132419",
        "trust": 1.1
      },
      {
        "db": "USCERT",
        "id": "SA08-162C",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "TA08-162C",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2008-06-09",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20080610 SECUNIA RESEARCH: APPLE QUICKTIME PICT IMAGE PARSING BUFFER OVERFLOW",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141",
        "trust": 0.6
      },
      {
        "db": "ZDI",
        "id": "ZDI-08-038",
        "trust": 0.3
      },
      {
        "db": "ZDI",
        "id": "ZDI-08-037",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "67152",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-31706",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "67149",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "67176",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "db": "BID",
        "id": "29619"
      },
      {
        "db": "BID",
        "id": "29649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "db": "PACKETSTORM",
        "id": "67149"
      },
      {
        "db": "PACKETSTORM",
        "id": "67176"
      },
      {
        "db": "PACKETSTORM",
        "id": "67152"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "id": "VAR-200806-0184",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-10T22:57:07.124000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "QuickTime 7.5",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT1991"
      },
      {
        "title": "QuickTime 7.5",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT1991?locale=ja_JP"
      },
      {
        "title": "TA08-162C",
        "trust": 0.8,
        "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-162c.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://secunia.com/secunia_research/2008-9/advisory/"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/29619"
      },
      {
        "trust": 2.5,
        "url": "http://www.us-cert.gov/cas/techalerts/ta08-162c.html"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/29293"
      },
      {
        "trust": 2.1,
        "url": "http://support.apple.com/kb/ht1991"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2008/jun/msg00000.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/29649"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1020213"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2008/1776/references"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/42943"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/493225/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2008/1776/references"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42943"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1581"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta08-162c/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta08-162c/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1581"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2008/jun/1020213.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa08-162c.html"
      },
      {
        "trust": 0.7,
        "url": "http://www.apple.com/quicktime/"
      },
      {
        "trust": 0.6,
        "url": "/archive/1/493225"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/493225/100/0/threaded"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/493247"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/493248"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/132419"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-08-037"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-08-038"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_research/2008-9/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5090/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/29293/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_specialist/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/about_secunia/64/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://docs.info.apple.com/article.html?artnum=304263\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=apple_quicktime_7.5\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/quicktime/download/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/kb/ht1991\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta08-162c.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://docs.info.apple.com/article.html?artnum=106704\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/secunia_research/33/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_research/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1581"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "db": "BID",
        "id": "29619"
      },
      {
        "db": "BID",
        "id": "29649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "db": "PACKETSTORM",
        "id": "67149"
      },
      {
        "db": "PACKETSTORM",
        "id": "67176"
      },
      {
        "db": "PACKETSTORM",
        "id": "67152"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "db": "BID",
        "id": "29619"
      },
      {
        "db": "BID",
        "id": "29649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "db": "PACKETSTORM",
        "id": "67149"
      },
      {
        "db": "PACKETSTORM",
        "id": "67176"
      },
      {
        "db": "PACKETSTORM",
        "id": "67152"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-06-10T00:00:00",
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "date": "2008-06-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "date": "2008-06-10T00:00:00",
        "db": "BID",
        "id": "29619"
      },
      {
        "date": "2008-06-09T00:00:00",
        "db": "BID",
        "id": "29649"
      },
      {
        "date": "2008-07-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "date": "2008-06-11T00:36:08",
        "db": "PACKETSTORM",
        "id": "67149"
      },
      {
        "date": "2008-06-11T03:00:24",
        "db": "PACKETSTORM",
        "id": "67176"
      },
      {
        "date": "2008-06-11T00:37:05",
        "db": "PACKETSTORM",
        "id": "67152"
      },
      {
        "date": "2008-06-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      },
      {
        "date": "2008-06-10T18:32:00",
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-06-10T00:00:00",
        "db": "CERT/CC",
        "id": "VU#132419"
      },
      {
        "date": "2018-10-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31706"
      },
      {
        "date": "2008-06-11T17:22:00",
        "db": "BID",
        "id": "29619"
      },
      {
        "date": "2008-06-11T19:12:00",
        "db": "BID",
        "id": "29649"
      },
      {
        "date": "2008-07-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001435"
      },
      {
        "date": "2008-09-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2008-1581"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "67176"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple QuickTime \"file: URL\" arbitrary code execution",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#132419"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-141"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…