Korean
<< Back
VID 28110
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The QuickTime Player, according to its version number, has a buffer overflow vulnerability in its PictureViewer. Apple's QuickTime Player is a player that allow users to view local and remote multimedia content. Other applications, such as web browsers, that wish to utilize QuickTime functionality must use the QuickTime extension (QuickTime.qts) component. This component in Apple QuickTime version 6.5 contains a heap-based buffer overflow vulnerability in the routine responsible for copying Sample-to-Chunk table entries into an array. By convincing a user to execute a specially crafted QuickTime file (.mov file), an attacker could cause QuickTime to crash or potentially execute arbitrary code.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.kb.cert.org/vuls/id/782958
http://www.ciac.org/ciac/bulletins/o-135.shtml
http://www.ciac.org/ciac/bulletins/o-138.shtml
http://www.eeye.com/html/Research/Advisories/AD20040502.html
http://secunia.com/advisories/11071/
http://www.securitytracker.com/alerts/2004/Apr/1010010.html
http://www.securiteam.com/windowsntfocus/5NP020KCVU.html
http://developer.apple.com/documentation/QuickTime/QTFF/index.html

* Platforms Affected:
Apple Computer, Inc., QuickTime Player 6.5
Apple Computer, Inc., Mac OS 10.x
Microsoft Windows Any version
Recommendation Upgrade to the latest version of QuickTime Player (6.5.2 or later), available from the Apple Web site at http://www.apple.com/quicktime/
Related URL CVE-2004-0431 (CVE)
Related URL 12905 (SecurityFocus)
Related URL 16026 (ISS)