VID |
50157 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Apple QuickTime installed on the remote Windows host is prior to 7.7.7. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists due to improper validation of user-supplied input. An attacker can exploit this, with specially crafted image data in an SGI file, to execute arbitrary code. (CVE-2015-3661)
- An arbitrary code execution vulnerability exists due to an out-of-bounds write flaw caused by improper validation of user-supplied input. An attacker can exploit this, with specially crafted image data in a GIF file, to execute arbitrary code. (CVE-2015-3662)
- An arbitrary code execution vulnerability exists due to an out-of-bounds write flaw caused by improper validation of user-supplied input. An attacker can exploit this, with a specially crafted image descriptor in a GIF file, to execute arbitrary code. (CVE-2015-3663)
- An overflow condition exists due to improper validation of user-supplied input when handling 'alis' atoms. An attacker can exploit this, with a specially crafted file, to cause a stack-based buffer overflow, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2015-3664)
- A user-after-free error exists when handling object properties in movie files. An attacker can exploit this, with a specially crafted movie file, to dereference already freed memory, potentially resulting in the execution of arbitrary code. (CVE-2015-3665)
- A memory corruption flaw exists due to improper validation of user-supplied input when handling the 'code' atom within the 'minf' (Media Information) atom. An attacker can exploit this, with a specially crafted file, to corrupt memory, potentially resulting in the execution of arbitrary code. (CVE-2015-3666)
- A user-after-free error exists in the QuickTimeMPEG4!0x147f0() function when handling 'stbl' atoms. An attacker can exploit this, with a specially crafted .MOV file, to dereference already freed memory, potentially resulting in the execution of arbitrary code. (CVE-2015-3667)
- A memory corruption flaw exists due to improper validation of user-supplied input when handling movie files. An attacker can exploit this, with a specially crafted file, to corrupt memory, potentially resulting in the execution of arbitrary code. (CVE-2015-3668)
- An overflow condition exists due to improper validation of user-supplied input. An attacker can exploit this, with a specially crafted SGI file, to cause a heap-based buffer overflow, potentially resulting in the execution of arbitrary code. (CVE-2015-3669)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://support.apple.com/en-us/HT204947 https://lists.apple.com/archives/security-announce/2015/Jun/msg00005.html
* Platforms Affected: QuickTime versions prior to 7.7.7 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of QuickTime Player (7.7.7 or later), available from the Apple Web site at http://www.apple.com/quicktime |
Related URL |
CVE-2015-3661,CVE-2015-3662,CVE-2015-3663,CVE-2015-3664,CVE-2015-3665,CVE-2015-3666,CVE-2015-3667,CVE-2015-3668,CVE-2015-3669 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|