var-201205-0393
Vulnerability from variot
Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TeXML file. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of XML elements within a TeXML file. Specifically, when handling the style XML element the code within QuickTime3GPP.qtx does not properly validate the length of the data within specific sub-fields. By providing specially crafted data, the code can be made to copy too much into a fixed-length buffer on the stack. These issues arise when the application handles specially crafted files. Versions prior to QuickTime 7.7.2 are vulnerable on Windows 7, Vista and XP. This BID is being retired. The following individual records exist to better document the issues: 53584 Apple QuickTime Prior To 7.7.2 '.pict' Files Memory Corruption Vulnerability 53583 Apple QuickTime Prior To 7.7.2 QTVR Files Remote Code Execution Vulnerability 53582 Apple QuickTime Prior To 7.7.2 'sean' Atoms Integer Overflow Vulnerability 53580 Apple QuickTime Prior To 7.7.2 Sorenson Files Buffer Overflow Vulnerability 53579 Apple QuickTime Prior To 7.7.2 RLE Files Buffer Overflow Vulnerability 53578 Apple QuickTime Prior To 7.7.2 File Path Handling Stack Overflow Vulnerability 53577 Apple QuickTime Prior To 7.7.2 QTMovie Objects Stack Overflow Vulnerability 53576 Apple QuickTime Prior To 7.7.2 H.264 Encoded Heap Overflow Vulnerability 53574 Apple QuickTime Prior To 7.7.2 Text Tracks Heap Overflow Vulnerability 53571 Apple QuickTime Prior To 7.7.2 Multiple Stack Overflow Vulnerabilities. Apple QuickTime is a multimedia playback software developed by Apple (Apple). The software is capable of handling multiple sources such as digital video, media segments, and more. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
ZDI-12-095 : Apple Quicktime TeXML transform Attribute Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-095 June 21, 2012
-
-- CVE ID: CVE-2012-0663
-
-- CVSS: 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
-
-- Affected Vendors:
Apple
- -- Affected Products:
Apple QuickTime
-
-- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 12405.
-
-- Vendor Response:
Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT1222
-
-- Disclosure Timeline: 2011-10-21 - Vulnerability reported to vendor 2012-06-21 - Coordinated public release of advisory
-
-- Credit: This vulnerability was discovered by:
-
Alexander Gavrun
-
-- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8
wsBVAwUBT+OLA1VtgMGTo1scAQJI7Qf+OnfYeok9hy6ohcokglQSew5g0w2FfAUP J9Y899T0z94b00bsE7dRG3DADKnvsFkGXmgID94YCwdQL9hJ4MKNZepaBwL+LsdV lv4Wrm+Q7Zoy22EdeuUu1QU4MfrWyKfxxKgrH1Salk7BcWCjXKHh07dDBB0Ep7TG ECd1DAf+yRP6Ax3MKB0CfgRsdNcRtU7jOoZsf199UfCBqQr1wL4vxknXi8bP3mb1 8+2/xJcJ0CiIO7lkeYSxXY+me9ufQiuNLP1H3CgYT75oTdJtdm0lUqmunPiBaNum uOnRPZswFoNuQsKt+GOn7cw8KZR7BJS0akhzDGfQ3hPZFJ0EkCQ6Iw== =xhVI -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-05-15-1 QuickTime 7.7.2
QuickTime 7.7.2 is now available and addresses the following:
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple stack overflows existed in QuickTime's handling of TeXML files. These issues do not affect OS X systems. CVE-ID CVE-2012-0663 : Alexander Gavrun working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A heap overflow existed in QuickTime's handling of text tracks. This issue does not affect OS X systems. CVE-ID CVE-2012-0664 : Alexander Gavrun working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in the handling of H.264 encoded movie files. CVE-ID CVE-2012-0665 : Luigi Auriemma working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Opening a maliciously crafted MP4 encoded file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue existed in the handling of MP4 encoded files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.3. For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-001. CVE-ID CVE-2011-3458 : Luigi Auriemma and pa_kt both working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An off by one buffer overflow existed in the handling of rdrf atoms in QuickTime movie files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.3. For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-001. CVE-ID CVE-2011-3459 : Luigi Auriemma working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file during progressive download may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of audio sample tables. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.4. For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-002. CVE-ID CVE-2012-0658 : Luigi Auriemma working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted MPEG file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of MPEG files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.4. For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-002. CVE-ID CVE-2012-0659 : An anonymous researcher working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A stack buffer overflow existed in the QuickTime plugin's handling of QTMovie objects. This issue does not affect OS X systems. CVE-ID CVE-2012-0666 : CHkr_D591 working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PNG files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.3. For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-001. CVE-ID CVE-2011-3460 : Luigi Auriemma working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of QTVR movie files. This issue does not affect OS X systems. CVE-ID CVE-2012-0667 : Alin Rad Pop working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A use after free issue existed in the handling of JPEG2000 encoded movie files. This issue does not affect systems prior to OS X Lion. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.4. CVE-ID CVE-2012-0661 : Damian Put working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of RLE encoded movie files. CVE-ID CVE-2012-0668 : Luigi Auriemma working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in QuickTime's handling of Sorenson encoded movie files. This issue does not affect OS X systems. CVE-ID CVE-2012-0669 : Damian Put working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in QuickTime's handling of sean atoms. CVE-ID CVE-2012-0670 : Tom Gallagher (Microsoft) and Paul Bates (Microsoft) working with HP's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted .pict file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of .pict files. CVE-ID CVE-2012-0671 : Rodrigo Rubira Branco (twitter.com/bsdaemon) from the Qualys Vulnerability & Malware Research Labs (VMRL)
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Opening a file in a maliciously crafted path may lead to an unexpected application termination or arbitrary code execution Description: A stack buffer overflow existed in QuickTime's handling of file paths. This issue does not affect OS X systems. CVE-ID CVE-2012-0265 : Tielei Wang of Georgia Tech Information Security Center via Secunia SVCRP
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted MPEG file may lead to an unexpected application termination or arbitrary code execution Description: An integer underflow existed in QuickTime's handling of audio streams in MPEG files. CVE-ID CVE-2012-0660 : Justin Kim at Microsoft and Microsoft Vulnerability Research (MSVR)
QuickTime 7.7.2 may be obtained from the QuickTime Downloads site: http://www.apple.com/quicktime/download/
The download file is named: "QuickTimeInstaller.exe" Its SHA-1 digest is: ed569d62b3f8c24ac8e9aec7275f17cbb14d2124
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJPsobhAAoJEPefwLHPlZEwk/sP/0C8iXVhnG481GbA03CMhKXJ XDooIlCG6YeoeJxGfri/vqlzqcHe3R90K6R89z1dKGU2bWGvtITh95E+WKll++7F hHYq6YC+r/o1cP1SjBi6A3swhN57m1nQZRIEnnIm+nBSxaiHA6xdRSUaK4ighLSA jbOVfu/6NPuGSlgWBPKSISDY2FhL0GH0QVLW/piVtMTrxhizlE7dgieipAPoVvRC SW2W0te7ujo2X167f2GS8EwplUkj/yVeScdr/6HjLkAXIQ1B9RNqTeOdyQZjTxay 32xhZTQ+JfSQzY6VSGoF0bqlK39u5UyzySIKS446OxclYI6xGKSFvTN3nBUwERd+ W+E/4k3Ry4OYEkgZ5yltXO8bJvGZtmpLOkq94Vb4w7EaEgJ452J/YjqCEEbmtAKM 0W9g1jt5av5Hv+vQ7rufR1tJ6CqkIDDr0f3qY+W/F8ZtdA8Bkvm9568d3L1Vlbai zy89w39Z1RTPMLccZEhtd+80f75P+R3n88X5czjXYignrUJbxhM/S8meqQB5GUB9 nJvZtWB1wlACHJ/EKUTv6miK20XE1OukRyvW0o7WWplqBj5KFWvRcV0tovfybGY9 EKwmao4Hwmq+ovJBFLZj/TV6MMxsJjS9qVea/yOlzZCy+6dwok38yyMAqy+m2dLT X2aq0dgzK7qjPx0FRyOx =BPXs -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0393", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "quicktime", "scope": null, "trust": 2.8, "vendor": "apple", "version": null }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.1.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "5.0.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.1.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.69.80.9" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.8" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.9" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.62.14.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.5" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.5.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.4.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.3" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.65.17.80" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.5" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.5.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.60.92.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.68.75.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.7.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.5" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.3.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.6" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.2.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.5.5" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.66.71.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.5.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.2.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.1.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.4" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.7" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "7.7.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.67.75.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.1.70" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.2.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.6" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.5" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.5.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.64.17.73" }, { "model": "quicktime", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "7.7.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.7.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.8" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.7" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.6(1671)" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.6" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.5.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.4.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.4.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.7" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.64.17.73" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6.9" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.6" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.4" }, { "model": "quicktime player", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "7.7.2" } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-109" }, { "db": "ZDI", "id": "ZDI-12-107" }, { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "BID", "id": "53547" }, { "db": "BID", "id": "53571" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "db": "CNNVD", "id": "CNNVD-201205-259" }, { "db": "NVD", "id": "CVE-2012-0663" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:quicktime", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002428" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alexander Gavrun", "sources": [ { "db": "ZDI", "id": "ZDI-12-109" }, { "db": "ZDI", "id": "ZDI-12-107" }, { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "BID", "id": "53571" } ], "trust": 3.1 }, "cve": "CVE-2012-0663", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2012-0663", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 2.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2012-0663", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-53944", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "ZDI", "id": "CVE-2012-0663", "trust": 2.8, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2012-0663", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-0663", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201205-259", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-53944", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-109" }, { "db": "ZDI", "id": "ZDI-12-107" }, { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "VULHUB", "id": "VHN-53944" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "db": "CNNVD", "id": "CNNVD-201205-259" }, { "db": "NVD", "id": "CVE-2012-0663" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TeXML file. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of XML elements within a TeXML file. Specifically, when handling the style XML element the code within QuickTime3GPP.qtx does not properly validate the length of the data within specific sub-fields. By providing specially crafted data, the code can be made to copy too much into a fixed-length buffer on the stack. \nThese issues arise when the application handles specially crafted files. \nVersions prior to QuickTime 7.7.2 are vulnerable on Windows 7, Vista and XP. \nThis BID is being retired. The following individual records exist to better document the issues:\n53584 Apple QuickTime Prior To 7.7.2 \u0027.pict\u0027 Files Memory Corruption Vulnerability\n53583 Apple QuickTime Prior To 7.7.2 QTVR Files Remote Code Execution Vulnerability\n53582 Apple QuickTime Prior To 7.7.2 \u0027sean\u0027 Atoms Integer Overflow Vulnerability\n53580 Apple QuickTime Prior To 7.7.2 Sorenson Files Buffer Overflow Vulnerability\n53579 Apple QuickTime Prior To 7.7.2 RLE Files Buffer Overflow Vulnerability\n53578 Apple QuickTime Prior To 7.7.2 File Path Handling Stack Overflow Vulnerability\n53577 Apple QuickTime Prior To 7.7.2 QTMovie Objects Stack Overflow Vulnerability\n53576 Apple QuickTime Prior To 7.7.2 H.264 Encoded Heap Overflow Vulnerability\n53574 Apple QuickTime Prior To 7.7.2 Text Tracks Heap Overflow Vulnerability\n53571 Apple QuickTime Prior To 7.7.2 Multiple Stack Overflow Vulnerabilities. Apple QuickTime is a multimedia playback software developed by Apple (Apple). The software is capable of handling multiple sources such as digital video, media segments, and more. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nZDI-12-095 : Apple Quicktime TeXML transform Attribute Remote Code\nExecution Vulnerability\nhttp://www.zerodayinitiative.com/advisories/ZDI-12-095\nJune 21, 2012\n\n- -- CVE ID:\nCVE-2012-0663\n\n- -- CVSS:\n7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P\n\n- -- Affected Vendors:\n\nApple\n\n- -- Affected Products:\n\nApple QuickTime\n\n- -- TippingPoint(TM) IPS Customer Protection:\nTippingPoint IPS customers have been protected against this\nvulnerability by Digital Vaccine protection filter ID 12405. \n\n- -- Vendor Response:\n\nApple has issued an update to correct this vulnerability. More details can\nbe found at:\n\nhttp://support.apple.com/kb/HT1222\n\n\n- -- Disclosure Timeline:\n2011-10-21 - Vulnerability reported to vendor\n2012-06-21 - Coordinated public release of advisory\n\n- -- Credit:\nThis vulnerability was discovered by:\n\n* Alexander Gavrun\n\n- -- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, The Zero Day Initiative (ZDI) represents \na best-of-breed model for rewarding security researchers for responsibly\ndisclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is\nused. TippingPoint does not re-sell the vulnerability details or any\nexploit code. Instead, upon notifying the affected product vendor,\nTippingPoint provides its customers with zero day protection through\nits intrusion prevention technology. Explicit details regarding the\nspecifics of the vulnerability are not exposed to any parties until\nan official vendor patch is publicly available. Furthermore, with the\naltruistic aim of helping to secure a broader user base, TippingPoint\nprovides this vulnerability information confidentially to security\nvendors (including competitors) who have a vulnerability protection or\nmitigation product. \n\nOur vulnerability disclosure policy is available online at:\n\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\n\nFollow the ZDI on Twitter:\n\n http://twitter.com/thezdi\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 10.2.0 (Build 1950)\nCharset: utf-8\n\nwsBVAwUBT+OLA1VtgMGTo1scAQJI7Qf+OnfYeok9hy6ohcokglQSew5g0w2FfAUP\nJ9Y899T0z94b00bsE7dRG3DADKnvsFkGXmgID94YCwdQL9hJ4MKNZepaBwL+LsdV\nlv4Wrm+Q7Zoy22EdeuUu1QU4MfrWyKfxxKgrH1Salk7BcWCjXKHh07dDBB0Ep7TG\nECd1DAf+yRP6Ax3MKB0CfgRsdNcRtU7jOoZsf199UfCBqQr1wL4vxknXi8bP3mb1\n8+2/xJcJ0CiIO7lkeYSxXY+me9ufQiuNLP1H3CgYT75oTdJtdm0lUqmunPiBaNum\nuOnRPZswFoNuQsKt+GOn7cw8KZR7BJS0akhzDGfQ3hPZFJ0EkCQ6Iw==\n=xhVI\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-05-15-1 QuickTime 7.7.2\n\nQuickTime 7.7.2 is now available and addresses the following:\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Visiting a maliciously crafted website may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple stack overflows existed in QuickTime\u0027s\nhandling of TeXML files. These issues do not affect OS X systems. \nCVE-ID\nCVE-2012-0663 : Alexander Gavrun working with HP\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A heap overflow existed in QuickTime\u0027s handling of text\ntracks. This issue does not affect OS X systems. \nCVE-ID\nCVE-2012-0664 : Alexander Gavrun working with HP\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A heap buffer overflow existed in the handling of H.264\nencoded movie files. \nCVE-ID\nCVE-2012-0665 : Luigi Auriemma working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Opening a maliciously crafted MP4 encoded file may lead to\nan unexpected application termination or arbitrary code execution\nDescription: An uninitialized memory access issue existed in the\nhandling of MP4 encoded files. For OS X Lion systems, this issue is\naddressed in OS X Lion v10.7.3. For Mac OS X v10.6 systems, this\nissue is addressed in Security Update 2012-001. \nCVE-ID\nCVE-2011-3458 : Luigi Auriemma and pa_kt both working with HP\u0027s Zero\nDay Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An off by one buffer overflow existed in the handling\nof rdrf atoms in QuickTime movie files. For OS X Lion systems, this\nissue is addressed in OS X Lion v10.7.3. For Mac OS X v10.6 systems,\nthis issue is addressed in Security Update 2012-001. \nCVE-ID\nCVE-2011-3459 : Luigi Auriemma working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file during progressive\ndownload may lead to an unexpected application termination or\narbitrary code execution\nDescription: A buffer overflow existed in the handling of audio\nsample tables. For OS X Lion systems, this issue is addressed in OS X\nLion v10.7.4. For Mac OS X v10.6 systems, this issue is addressed in\nSecurity Update 2012-002. \nCVE-ID\nCVE-2012-0658 : Luigi Auriemma working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted MPEG file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow existed in the handling of MPEG\nfiles. For OS X Lion systems, this issue is addressed in OS X Lion\nv10.7.4. For Mac OS X v10.6 systems, this issue is addressed in\nSecurity Update 2012-002. \nCVE-ID\nCVE-2012-0659 : An anonymous researcher working with HP\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Visiting a maliciously crafted website may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A stack buffer overflow existed in the QuickTime\nplugin\u0027s handling of QTMovie objects. This issue does not affect OS X\nsystems. \nCVE-ID\nCVE-2012-0666 : CHkr_D591 working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Processing a maliciously crafted PNG image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of PNG files. \nFor OS X Lion systems, this issue is addressed in OS X Lion v10.7.3. \nFor Mac OS X v10.6 systems, this issue is addressed in Security\nUpdate 2012-001. \nCVE-ID\nCVE-2011-3460 : Luigi Auriemma working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted QTVR movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A signedness issue existed in the handling of QTVR\nmovie files. This issue does not affect OS X systems. \nCVE-ID\nCVE-2012-0667 : Alin Rad Pop working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A use after free issue existed in the handling of\nJPEG2000 encoded movie files. This issue does not affect systems\nprior to OS X Lion. For OS X Lion systems, this issue is addressed in\nOS X Lion v10.7.4. \nCVE-ID\nCVE-2012-0661 : Damian Put working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of RLE\nencoded movie files. \nCVE-ID\nCVE-2012-0668 : Luigi Auriemma working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in QuickTime\u0027s handling of\nSorenson encoded movie files. This issue does not affect OS X\nsystems. \nCVE-ID\nCVE-2012-0669 : Damian Put working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow existed in QuickTime\u0027s handling of\nsean atoms. \nCVE-ID\nCVE-2012-0670 : Tom Gallagher (Microsoft) and Paul Bates (Microsoft)\nworking with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted .pict file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\n.pict files. \nCVE-ID\nCVE-2012-0671 : Rodrigo Rubira Branco (twitter.com/bsdaemon) from the\nQualys Vulnerability \u0026 Malware Research Labs (VMRL)\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Opening a file in a maliciously crafted path may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A stack buffer overflow existed in QuickTime\u0027s handling\nof file paths. This issue does not affect OS X systems. \nCVE-ID\nCVE-2012-0265 : Tielei Wang of Georgia Tech Information Security\nCenter via Secunia SVCRP\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted MPEG file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer underflow existed in QuickTime\u0027s handling of\naudio streams in MPEG files. \nCVE-ID\nCVE-2012-0660 : Justin Kim at Microsoft and Microsoft Vulnerability\nResearch (MSVR)\n\n\nQuickTime 7.7.2 may be obtained from the QuickTime Downloads site:\nhttp://www.apple.com/quicktime/download/\n\nThe download file is named: \"QuickTimeInstaller.exe\"\nIts SHA-1 digest is: ed569d62b3f8c24ac8e9aec7275f17cbb14d2124\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.18 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nX2aq0dgzK7qjPx0FRyOx\n=BPXs\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2012-0663" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "db": "ZDI", "id": "ZDI-12-109" }, { "db": "ZDI", "id": "ZDI-12-107" }, { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "BID", "id": "53547" }, { "db": "BID", "id": "53571" }, { "db": "VULHUB", "id": "VHN-53944" }, { "db": "PACKETSTORM", "id": "114045" }, { "db": "PACKETSTORM", "id": "112789" }, { "db": "PACKETSTORM", "id": "114315" } ], "trust": 5.04 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-53944", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-53944" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-0663", "trust": 5.9 }, { "db": "BID", "id": "53571", "trust": 1.4 }, { "db": "ZDI", "id": "ZDI-12-107", "trust": 1.1 }, { "db": "ZDI", "id": "ZDI-12-095", "trust": 1.1 }, { "db": "SECTRACK", "id": "1027065", "trust": 1.1 }, { "db": "ZDI", "id": "ZDI-12-109", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-108", "trust": 1.0 }, { "db": "BID", "id": "53547", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2012-002428", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1367", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1364", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1365", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1363", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201205-259", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2012-05-15-1", "trust": 0.6 }, { "db": "SECUNIA", "id": "47447", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19637", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19654", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "114315", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "114045", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-73357", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-88903", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "114327", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "19433", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-53944", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112789", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-109" }, { "db": "ZDI", "id": "ZDI-12-107" }, { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "VULHUB", "id": "VHN-53944" }, { "db": "BID", "id": "53547" }, { "db": "BID", "id": "53571" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "db": "PACKETSTORM", "id": "114045" }, { "db": "PACKETSTORM", "id": "112789" }, { "db": "PACKETSTORM", "id": "114315" }, { "db": "CNNVD", "id": "CNNVD-201205-259" }, { "db": "NVD", "id": "CVE-2012-0663" } ] }, "id": "VAR-201205-0393", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-53944" } ], "trust": 0.01 }, "last_update_date": "2024-09-19T22:21:33.128000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Apple has issued an update to correct this vulnerability.", "trust": 1.4, "url": "http://support.apple.com/kb/HT1222" }, { "title": "HT5261", "trust": 0.8, "url": "http://support.apple.com/kb/HT5261" } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-53944" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "db": "NVD", "id": "CVE-2012-0663" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/may/msg00005.html" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht5261" }, { "trust": 1.6, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/53571" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a16006" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1027065" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0663" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu466700" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0663" }, { "trust": 0.6, "url": "http://www.apple.com/quicktime/" }, { "trust": 0.6, "url": "http://secunia.com/advisories/47447" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/53547" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19654" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19637" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-109/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-108/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-107/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-095/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0663" }, { "trust": 0.2, "url": "http://www.zerodayinitiative.com/advisories/disclosure_policy/" }, { "trust": 0.2, "url": "http://twitter.com/thezdi" }, { "trust": 0.2, "url": "http://www.tippingpoint.com" }, { "trust": 0.2, "url": "http://www.zerodayinitiative.com" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-095" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0658" }, { "trust": 0.1, "url": "http://www.apple.com/quicktime/download/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0661" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3460" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0668" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0665" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0659" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0671" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0666" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0667" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0669" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3459" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3458" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0265" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0660" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0664" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-107" } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "VULHUB", "id": "VHN-53944" }, { "db": "BID", "id": "53547" }, { "db": "BID", "id": "53571" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "db": "PACKETSTORM", "id": "114045" }, { "db": "PACKETSTORM", "id": "112789" }, { "db": "PACKETSTORM", "id": "114315" }, { "db": "CNNVD", "id": "CNNVD-201205-259" }, { "db": "NVD", "id": "CVE-2012-0663" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-12-109" }, { "db": "ZDI", "id": "ZDI-12-107" }, { "db": "ZDI", "id": "ZDI-12-108" }, { "db": "ZDI", "id": "ZDI-12-095" }, { "db": "VULHUB", "id": "VHN-53944" }, { "db": "BID", "id": "53547" }, { "db": "BID", "id": "53571" }, { "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "db": "PACKETSTORM", "id": "114045" }, { "db": "PACKETSTORM", "id": "112789" }, { "db": "PACKETSTORM", "id": "114315" }, { "db": "CNNVD", "id": "CNNVD-201205-259" }, { "db": "NVD", "id": "CVE-2012-0663" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-06-28T00:00:00", "db": "ZDI", "id": "ZDI-12-109" }, { "date": "2012-06-28T00:00:00", "db": "ZDI", "id": "ZDI-12-107" }, { "date": "2012-06-28T00:00:00", "db": "ZDI", "id": "ZDI-12-108" }, { "date": "2012-06-21T00:00:00", "db": "ZDI", "id": "ZDI-12-095" }, { "date": "2012-05-16T00:00:00", "db": "VULHUB", "id": "VHN-53944" }, { "date": "2012-05-15T00:00:00", "db": "BID", "id": "53547" }, { "date": "2012-05-15T00:00:00", "db": "BID", "id": "53571" }, { "date": "2012-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "date": "2012-06-22T03:32:50", "db": "PACKETSTORM", "id": "114045" }, { "date": "2012-05-16T23:16:27", "db": "PACKETSTORM", "id": "112789" }, { "date": "2012-06-29T02:23:45", "db": "PACKETSTORM", "id": "114315" }, { "date": "2012-05-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-259" }, { "date": "2012-05-16T10:12:56.990000", "db": "NVD", "id": "CVE-2012-0663" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-06-28T00:00:00", "db": "ZDI", "id": "ZDI-12-109" }, { "date": "2012-06-28T00:00:00", "db": "ZDI", "id": "ZDI-12-107" }, { "date": "2012-06-28T00:00:00", "db": "ZDI", "id": "ZDI-12-108" }, { "date": "2012-06-21T00:00:00", "db": "ZDI", "id": "ZDI-12-095" }, { "date": "2017-09-19T00:00:00", "db": "VULHUB", "id": "VHN-53944" }, { "date": "2012-05-16T23:00:00", "db": "BID", "id": "53547" }, { "date": "2012-06-28T23:10:00", "db": "BID", "id": "53571" }, { "date": "2012-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002428" }, { "date": "2012-05-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-259" }, { "date": "2017-09-19T01:34:41.573000", "db": "NVD", "id": "CVE-2012-0663" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "114045" }, { "db": "PACKETSTORM", "id": "114315" }, { "db": "CNNVD", "id": "CNNVD-201205-259" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Windows Run on Apple QuickTime Vulnerable to stack-based buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002428" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "53547" }, { "db": "BID", "id": "53571" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.