CVE-2009-0010
Apple Quicktime PICT Opcode 0x71 Heap Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, and Apple QuickTime before 7.6.2, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PICT image with a crafted 0x77 Poly tag and a crafted length field, which triggers a heap-based buffer overflow.
Desbordamiento inferior de entero en QuickDraw Manager en Apple Mac OS X v10.4.11 y v10.5 antes de v10.5.7 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (cuelgue de aplicacion) a través de una imagen PICT elaborada que desencadena un desbordamiento de búfer basado en pila.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists in the parsing of PICT files in QuickTime.qts. While processing data for opcode 0x71 QuickTime trusts a value contained in the file and makes an allocation accordingly. By providing a malicious value this buffer can be undersized and subsequently can be overflowed leading to arbitrary code execution under the context of the user running QuickTime.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-12-15 CVE Reserved
- 2009-05-13 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/35074 | Third Party Advisory | |
http://secunia.com/advisories/35091 | Third Party Advisory | |
http://support.apple.com/kb/HT3591 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/503878/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/34926 | Vdb Entry | |
http://www.securityfocus.com/bid/34938 | Vdb Entry | |
http://www.securitytracker.com/id?1022209 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA09-133A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2009/1297 | Vdb Entry | |
http://www.vupen.com/english/advisories/2009/1407 | Vdb Entry | |
http://www.vupen.com/exploits/Apple_QuickTime_PICT_Poly_Tag_Parsing_Heap_Overflow_PoC_Exploit_1407144.php | X_refsource_misc | |
http://www.zerodayinitiative.com/advisories/ZDI-09-021 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | 2018-10-11 | |
http://support.apple.com/kb/HT3549 | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.11 Search vendor "Apple" for product "Mac Os X" and version "10.4.11" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5 Search vendor "Apple" for product "Mac Os X" and version "10.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.0 Search vendor "Apple" for product "Mac Os X" and version "10.5.0" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.1 Search vendor "Apple" for product "Mac Os X" and version "10.5.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.2 Search vendor "Apple" for product "Mac Os X" and version "10.5.2" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.3 Search vendor "Apple" for product "Mac Os X" and version "10.5.3" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.4 Search vendor "Apple" for product "Mac Os X" and version "10.5.4" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.5 Search vendor "Apple" for product "Mac Os X" and version "10.5.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.6 Search vendor "Apple" for product "Mac Os X" and version "10.5.6" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.4.11 Search vendor "Apple" for product "Mac Os X Server" and version "10.4.11" | - |
Safe
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5 Search vendor "Apple" for product "Mac Os X Server" and version "10.5" | - |
Safe
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5.0 Search vendor "Apple" for product "Mac Os X Server" and version "10.5.0" | - |
Safe
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5.1 Search vendor "Apple" for product "Mac Os X Server" and version "10.5.1" | - |
Safe
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5.2 Search vendor "Apple" for product "Mac Os X Server" and version "10.5.2" | - |
Safe
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5.3 Search vendor "Apple" for product "Mac Os X Server" and version "10.5.3" | - |
Safe
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5.4 Search vendor "Apple" for product "Mac Os X Server" and version "10.5.4" | - |
Safe
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5.6 Search vendor "Apple" for product "Mac Os X Server" and version "10.5.6" | - |
Safe
|