Date: 10 September 2008
References: ESB-2008.0876 ESB-2008.0942
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
A U S C E R T A L E R T
AL-2008.0097 -- AUSCERT ALERT
[Win][Mac][OSX]
QuickTime 7.5.5 released fixing multiple vulnerabilities
10 September 2008
===========================================================================
AusCERT Alert Summary
---------------------
Product: Quicktime prior to 7.5.5
Publisher: Apple
Operating System: Windows
Mac OS X
Impact: Execute Arbitrary Code/Commands
Denial of Service
Access: Remote/Unauthenticated
CVE Names: CVE-2008-3635 CVE-2008-3629 CVE-2008-3628
CVE-2008-3627 CVE-2008-3626 CVE-2008-3625
CVE-2008-3624 CVE-2008-3615 CVE-2008-3614
Original Bulletin: http://support.apple.com/kb/HT3027
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2008-09-09 QuickTime 7.5.5
QuickTime 7.5.5 is now available and addresses the following issues:
QuickTime
CVE-ID: CVE-2008-3615
Available for: Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: An uninitialized memory access issue exists in the
third-party Indeo v5 codec for QuickTime, which does not ship with
QuickTime. Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue by not rendering content encoded with any
version of the Indeo codec. This issue does not affect systems
running Mac OS X. Credit to Paul Byrne of NGSSoftware for reporting
this issue.
QuickTime
CVE-ID: CVE-2008-3635
Available for: Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A stack buffer overflow exists in the third-party Indeo
v3.2 codec for QuickTime. Viewing a maliciously crafted movie file
may lead to an unexpected application termination or arbitrary code
execution. This update addresses the issue by not rendering content
encoded with any version of the Indeo codec. This issue does not
affect systems running Mac OS X. Credit to an anonymous researcher
working with TippingPoint's Zero Day Initiative for reporting this
issue.
QuickTime
CVE-ID: CVE-2008-3624
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A heap buffer overflow exists in QuickTime's handling
of panorama atoms in QTVR (QuickTime Virtual Reality) movie files.
Viewing a maliciously crafted QTVR file may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved bounds checking of panorama
atoms. Credit to Roee Hay of IBM Rational Application Security
Research Group for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3625
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted QTVR movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A stack buffer overflow exists in QuickTime's handling
of panorama atoms in QTVR (QuickTime Virtual Reality) movie files.
Viewing a maliciously crafted QTVR file may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue through improved bounds checking of panorama
atoms. Credit to an anonymous researcher working with TippingPoint's
Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3614
Available for: Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution
Description: An integer overflow exists in QuickTime's handling of
PICT images. Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution. This
update addresses the issue by performing additional validation of
PICT images. Credit to an anonymous researcher working with the
iDefense VCP for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3626
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue exists in QuickTime's
handling of STSZ atoms in movie files. Viewing a maliciously crafted
movie file may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue through
improved bounds checking of STSZ atoms. Credit to an anonymous
researcher working with TippingPoint's Zero Day Initiative for
reporting this issue.
QuickTime
CVE-ID: CVE-2008-3627
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption exist in QuickTime's
handling of H.264 encoded movie files. Viewing a maliciously crafted
movie file may lead to an unexpected application termination or
arbitrary code execution. This update addresses the issue by
performing additional validation of H.264 encoded movie files. Credit
to an anonymous researcher and Subreption LLC working with
TippingPoint's Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3628
Available for: Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an
unexpected application termination or arbitrary code execution
Description: An invalid pointer issue exists in QuickTime's handling
of PICT images. Opening a maliciously crafted PICT image may lead to
an unexpected application termination or arbitrary code execution.
This update addresses the issue by correctly saving and restoring a
global variable. This issue does not affect systems running Mac OS X.
Credit to David Wharton for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3629
Available for: Mac OS X v10.4.9 - v10.4.11,
Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an
unexpected application termination
Description: An out-of-bounds read issue exists in QuickTime's
handling of PICT images. Opening a maliciously crafted PICT image may
lead to an unexpected application termination. This update addresses
the issue by performing additional validation of PICT images. Credit
to Sergio 'shadown' Alvarez of n.runs AG for reporting this issue.
QuickTime 7.5.5 may be obtained from the Software Update
application, or from the QuickTime Downloads site:
http://www.apple.com/quicktime/download/
For Mac OS X v10.5 or later
The download file is named: "QuickTime755_Leopard.dmg"
Its SHA-1 digest is: 934f784a553c2d4484d298071ad6d95ea34b8b2f
For Mac OS X v10.4.9 through Mac OS X v10.4.11
The download file is named: "QuickTime755_Tiger.dmg"
Its SHA-1 digest is: dcdf58e27aad2a1e958788c0f58584605c4b8e78
For Windows Vista / XP SP2 and SP3
The download file is named: "QuickTimeInstaller.exe"
Its SHA-1 digest is: 5900ff0b8044972cb06b52dfc913c6364bf27ccc
QuickTime with iTunes for Windows XP or Vista
The download file is named: iTunes8Setup.exe
Its SHA-1 digest is: 5d4ff8ffbe9feeaed67deb317797c1d71a03c359
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
- -----BEGIN PGP SIGNATURE-----
Version: 9.7.2.1608
wsBVAwUBSMbNVHkodeiKZIkBAQhOWQf/ZPtSQD+v9YL5BN0/YJ2c4d2CxZ3zOLzc
dcjGxWnEhx9IfqQrg8QEBeL1KlVKudfUdpFr+2+Ca33RQzdobCJpSZTO9yvzDXH1
goallGpEUXrPQE2iDiXM06JPJJBWMFJf2YnRyrSNrSY7lk5XkLStdCNnDqlad2W6
S6uQhlnmcP8g2+lRLxB0PbnTWNQOBDgUhEibwMpsMLOVDybLglS73hLgkSegsQfy
pZwNWiItYUYgJtaUoyATPS234QNQoyjpfCSCJSQHD7SsqSRaUuxWPOYIdbjSOfU8
72WytixXRbp3v9REOqTHxy8lX2VyYeceS4MgIMgPCR7tx/SOIKJuHQ==
=3b+w
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBSMcsrSh9+71yA2DNAQJSAgP+KxC/kANuwPueS89BguH6w+8F8XaDWvTv
ytO/WcGEVA4f3BrcGBsoWwpZl69G+xnm3qVcVrw+8A+3XDMhgwLC3TG2osp3zOFx
uPa/Yf+pC7BF6dbJvLa8Kg0ZLG+YxYhZ+P2LDkqX24hyOIiw4dwYKu0Y/WYh2G0a
/apF6vZu3n0=
=g17f
-----END PGP SIGNATURE-----
|