CVE-2008-3625
Apple QuickTime Panorama PDAT Atom Parsing Buffer Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in Apple QuickTime before 7.5.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a QuickTime Virtual Reality (QTVR) movie file with crafted (1) maxTilt, (2) minFieldOfView, and (3) maxFieldOfView elements in panorama track PDAT atoms.
Desbordamiento de búfer basado en pila en Apple QuickTime anterior 7.5.5, permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (caída de la aplicación), mediante un fichero de película QuickTime Virtual Reality (QTVR) con los elementos manipulados (1) maxTilt, (2) minFieldOfView y (3) maxFieldOfView en las pistas panorama de los átomos PDAT.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists in the handling of panorama track PDAT atoms. When the maxTilt, minFieldOfView and maxFieldOfView elements are corrupted, a stack buffer overflow occurs which can be further leveraged to execute arbitrary code under the context of the current user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-08-12 CVE Reserved
- 2008-09-09 CVE Published
- 2023-10-31 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/31821 | Third Party Advisory | |
http://securitytracker.com/id?1020841 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/496161/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2008/2527 | Third Party Advisory | |
http://www.zerodayinitiative.com/advisories/ZDI-08-058 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15935 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://support.apple.com/kb/HT3027 | 2018-10-11 | |
http://www.securityfocus.com/bid/31086 | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html | 2018-10-11 |