| VID |
28110 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The QuickTime Player, according to its version number, has a buffer overflow vulnerability in its PictureViewer. Apple's QuickTime Player is a player that allow users to view local and remote multimedia content. Other applications, such as web browsers, that wish to utilize QuickTime functionality must use the QuickTime extension (QuickTime.qts) component. This component in Apple QuickTime version 6.5 contains a heap-based buffer overflow vulnerability in the routine responsible for copying Sample-to-Chunk table entries into an array. By convincing a user to execute a specially crafted QuickTime file (.mov file), an attacker could cause QuickTime to crash or potentially execute arbitrary code.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.kb.cert.org/vuls/id/782958 http://www.ciac.org/ciac/bulletins/o-135.shtml http://www.ciac.org/ciac/bulletins/o-138.shtml http://www.eeye.com/html/Research/Advisories/AD20040502.html http://secunia.com/advisories/11071/ http://www.securitytracker.com/alerts/2004/Apr/1010010.html http://www.securiteam.com/windowsntfocus/5NP020KCVU.html http://developer.apple.com/documentation/QuickTime/QTFF/index.html
* Platforms Affected: Apple Computer, Inc., QuickTime Player 6.5 Apple Computer, Inc., Mac OS 10.x Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of QuickTime Player (6.5.2 or later), available from the Apple Web site at http://www.apple.com/quicktime/ |
| Related URL |
CVE-2004-0431 (CVE) |
| Related URL |
12905 (SecurityFocus) |
| Related URL |
16026 (ISS) |
|