Apple QuickTime是一款流行的多媒体播放器,支持多种媒体格式。
QuickTime在解析pict文件中的Poly类型opcodes(opcodes 0x0070-74)或PackBitsRgn字段(Opcode 0x0099)时存在堆溢出漏洞,如果用户受骗打开了畸形的PICT文件的话,则在处理结构中的特制元素时就会触发这个溢出,导致执行任意指令。
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
http://www.apple.com/support/downloads/quicktime73forpanther.html
http://www.apple.com/support/downloads/quicktime73fortiger.html
http://www.apple.com/support/downloads/quicktime73forwindows.html
来源: US-CERT
名称: TA07-310A
链接:http://www.us-cert.gov/cas/techalerts/TA07-310A.html
来源: US-CERT
名称: VU#690515
链接:http://www.kb.cert.org/vuls/id/690515
来源: VUPEN
名称: ADV-2007-3723
链接:http://www.frsirt.com/english/advisories/2007/3723
来源: SECUNIA
名称: 27523
链接:http://secunia.com/advisories/27523
来源: APPLE
名称: APPLE-SA-2007-11-05
链接:http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html
来源: MISC
链接:http://www.zerodayinitiative.com/advisories/ZDI-07-067.html
来源: MISC
链接:http://www.zerodayinitiative.com/advisories/ZDI-07-066.html
来源: SECTRACK
名称: 1018894
链接:http://www.securitytracker.com/id?1018894
来源: BUGTRAQ
名称: 20071105 ZDI-07-067: Apple QuickTime PICT File Poly Opcodes Heap Corruption Vulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/483313/100/0/threaded
来源: BUGTRAQ
名称: 20071105 ZDI-07-066: Apple Quicktime PICT File PackBitsRgn Parsing Heap Corruption Vulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/483311/100/0/threaded
来源: OSVDB
名称: 38546
链接:http://osvdb.org/38546
来源: docs.info.apple.com
链接:http://docs.info.apple.com/article.html?artnum=306896
来源: XF
名称: quicktime-poly-type-bo(38281)
链接:http://xforce.iss.net/xforce/xfdb/38281
来源: XF
名称: quicktime-packbitsrgn-bo(38280)
链接:http://xforce.iss.net/xforce/xfdb/38280
来源: BID
名称: 26345
链接:http://www.securityfocus.com/bid/26345
来源: SREASON
名称: 3351
链接:http://securityreason.com/securityalert/3351
暂无