var-201110-0426
Vulnerability from variot
Buffer overflow in CoreMedia, as used in Apple iTunes before 10.5, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the way Quicktime handles H.264 streams. When parsing the Sequence Parameter Set data for a H.264 stream it reads the frame cropping offset fields. When those fields contain incorrect data Quicktime will eventually write outside the buffer allocated for the movie stream. This can result in remote code execution under the context of the current user. Apple Mac OS X is prone to a buffer-overflow vulnerability that affects the CoreMedia component. Failed exploit attempts will likely result in a denial-of-service condition. A buffer overflow vulnerability exists in CoreMedia versions of Apple iTunes prior to 10.5. More details can be found at:
http://support.apple.com/kb/HT4981
-- Disclosure Timeline: 2011-07-20 - Vulnerability reported to vendor 2011-10-26 - Coordinated public release of advisory
-- Credit: This vulnerability was discovered by:
- Damian Put
-- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
. Apple has released updates to address these vulnerabilities.
I. Apple has released updates to address these vulnerabilities.
II.
III. This advisory describes any known issues related to the updates and the specific impacts for each vulnerability. Administrators are encouraged to note these issues and impacts and test for any potentially adverse effects before wide-scale deployment.
IV. Please send email to cert@cert.org with "TA11-286A Feedback VU#421739" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2011 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
October 13, 2011: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTpb8zj/GkGVXE7GMAQI21Af/SHWzIangqPW9vtuG/MQWSBMy9nG4wIZS DUEAWBEMPTKF3fLrIy6TVpRLN3q/q4dCYXzM4lec4IzKvEbV/bUyg15xEfYdxB0v s/vARGNwf7tjSbjo+PaHLuSZ1HLn/GLO3CXaf+ut/Kb8y9Fsir5klMgrCX/N0JkY dLoV9R6zGs1aQzmF9ULB1IQ2/lUkg6CGnyARh0prfhRFwKfu7NZXb8yz5ex68q6V NF6j9l+XK0Cl4K7R+0ESD4e47jLCg6iN175O8VzrlxiRvBRAyTaFycdMB4uSkmii xu8SqU2QFhsIJy8J+i1Bb6kuWkaxAnUbxO4tRrmXoqTXl9m0CtpnWA== =3Wp2 -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool.
Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/
TITLE: Apple iTunes Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA46339
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46339/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46339
RELEASE DATE: 2011-10-13
DISCUSS ADVISORY: http://secunia.com/advisories/46339/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/46339/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46339
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Apple has reported multiple vulnerabilities in Apple iTunes, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system.
Multiple vulnerabilities exist within the WebKit and ColorSync components.
For more information: SA44375 (#8) SA45097 (#2) SA45325 SA45498 SA45698 (#2) SA46049 (#11) SA46171 (#6)
1) An error in the CoreFoundation component when handling string tokenization can be exploited to corrupt memory via a MitM (Man-in-the-Middle) attack.
2) An error in the CoreAudio component when handling Advanced Audio Coding (AAC) streams can be exploited to cause a buffer overflow.
4) Some errors in the WebKit component when using the AddressSanitizer can be exploited to corrupt memory.
5) Multiple unspecified errors in the WebKit component can be exploited to corrupt memory.
SOLUTION: Update to version 10.5.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor.
The vendor also credits: 2) Luigi Auriemma via ZDI. 3) Damian Put via ZDI. 4) Cris Neckar, Adam Barth, and Abhishek Arya (Inferno), Google Chrome Security Team.
The vendor provides a bundled list of credits for vulnerabilities in
5:
- Cris Neckar, Google Chrome Security Team
- Abhishek Arya (Inferno), Google Chrome Security Team
- SkyLined, Google Chrome Security Team
- Raman Tenneti and Philip Rogers, Google
- Sadrul Habib Chowdhury, Chromium development community
- Cris Neckar and Abhishek Arya (Inferno), Google Chrome Security Team
- Dimitri Glazkov, Kent Tamura, Dominic Cooney, Chromium development community
- Martin Barbella
- Slawomir Blazek
- vkouchna
ORIGINAL ADVISORY: http://support.apple.com/kb/HT4981
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2011-10-26-1 QuickTime 7.7.1
QuickTime 7.7.1 is now available and addresses the following:
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in QuickTime's handling of H.264 encoded movie files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.2. CVE-ID CVE-2011-3219 : Damian Put working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in QuickTime's handling of URL data handlers within movie files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.2. CVE-ID CVE-2011-3220 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An implementation issue existed in QuickTime's handling of the atom hierarchy within a movie file. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.2. CVE-ID CVE-2011-3221 : an anonymous researcher working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: An attacker in a privileged network position may inject script in the local domain when viewing template HTML Description: A cross-site scripting issue existed in QuickTime Player's "Save for Web" export. The template HTML files generated by this feature referenced a script file from a non-encrypted origin. An attacker in a privileged network position may be able to inject malicious scripts in the local domain if the user views a template file locally. This issue is addressed by removing the reference to an online script. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-3218 : Aaron Sigel of vtty.com
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted FlashPix file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in QuickTime's handling of FlashPix files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.2. CVE-ID CVE-2011-3222 : Damian Put working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in QuickTime's handling of FLIC files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.2. CVE-ID CVE-2011-3223 : Matt 'j00ru' Jurczyk working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime's handling of movie files. For OS X Lion systems, these issues are addressed in OS X Lion v10.7.2. CVE-ID CVE-2011-3228 : Apple
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted PICT file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow issue existed in the handling of PICT files. CVE-ID CVE-2011-3247 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of font tables embedded in QuickTime movie files. CVE-ID CVE-2011-3248 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow issue existed in the handling of FLC encoded movie files. CVE-ID CVE-2011-3249 : Matt 'j00ru' Jurczyk working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow issue existed in the handling of JPEG2000 encoded movie files. CVE-ID CVE-2011-3250 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of TKHD atoms in QuickTime movie files. CVE-ID CVE-2011-3251 : Damian Put working with TippingPoint's Zero Day Initiative
QuickTime 7.7.1 may be obtained from the QuickTime Downloads site: http://www.apple.com/quicktime/download/
The download file is named: "QuickTimeInstaller.exe" Its SHA-1 digest is: 9bf0e5da752663d1b8d8a415f938dc2d3b04eee5
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin)
iQEcBAEBAgAGBQJOqH2VAAoJEGnF2JsdZQeecGQIAIY4HmK221wqZEuxnTFYZdnv CFnX2vc1cn22XODSXQV5x38zEd5RV1X/Crh3QcG/rSmhOKxckCJG5G4cRk9dNmdu vpaU3+cceDTWieSmgwZX0QRScqdn6+rMHzJqWnR8i1E+bfDKhB5fl4eB1IGmRnAk W4wZvUd06pMwSKm35d7whBBsiIz0gmIGz2Ktf7ft6wObHyy0Gq/eHWZFm2/VdX1p Z+gXnbKTsYsgSeE33IGqgbA6+yFpA41ueKqR6084n6aUWdpb7GHpTNI5v3h7Sq53 i3BxkfDIOpgHyd7/G/b1Rmmv9k6fO64GCyvvuxr6laIstfCPYqROoajx1tsFStU= =LmVu -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201110-0426", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "8.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "8.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "8.2.1" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "8.2" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "8.0.2" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "8.1" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.7.1" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.7.0" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "8.1.1" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.7" }, { "model": "quicktime", "scope": null, "trust": 1.5, "vendor": "apple", "version": null }, { "model": "itunes", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "10.2" }, { "model": "itunes", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "10.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.6" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.1.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.5" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.6.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.4.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.2.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.5" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "5.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.0" }, { "model": "itunes", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.4.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.2.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.5" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "5.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.5.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.5.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.1.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.9.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.8.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "5.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.4" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.1.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.2.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "v10.7.2" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x server", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "v10.7.2" }, { "model": "itunes", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.8" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.7" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.6(1671)" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.6" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.5.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.3.1.70" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.3.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.6" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.7" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.64.17.73" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6.9" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.6" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.2.2" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10" }, { "model": "quicktime player", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.7.1" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "itunes", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "10.5" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-303" }, { "db": "BID", "id": "50068" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "db": "CNNVD", "id": "CNNVD-201110-232" }, { "db": "NVD", "id": "CVE-2011-3219" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:itunes", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:quicktime", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002424" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Damian Put", "sources": [ { "db": "ZDI", "id": "ZDI-11-303" } ], "trust": 0.7 }, "cve": "CVE-2011-3219", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2011-3219", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2011-3219", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-51164", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-3219", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-3219", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2011-3219", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201110-232", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-51164", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-303" }, { "db": "VULHUB", "id": "VHN-51164" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "db": "CNNVD", "id": "CNNVD-201110-232" }, { "db": "NVD", "id": "CVE-2011-3219" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in CoreMedia, as used in Apple iTunes before 10.5, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the way Quicktime handles H.264 streams. When parsing the Sequence Parameter Set data for a H.264 stream it reads the frame cropping offset fields. When those fields contain incorrect data Quicktime will eventually write outside the buffer allocated for the movie stream. This can result in remote code execution under the context of the current user. Apple Mac OS X is prone to a buffer-overflow vulnerability that affects the CoreMedia component. Failed exploit attempts will likely result in a denial-of-service condition. A buffer overflow vulnerability exists in CoreMedia versions of Apple iTunes prior to 10.5. More details\ncan be found at:\n\nhttp://support.apple.com/kb/HT4981\n\n\n\n-- Disclosure Timeline:\n2011-07-20 - Vulnerability reported to vendor\n2011-10-26 - Coordinated public release of advisory\n\n-- Credit:\nThis vulnerability was discovered by:\n\n* Damian Put\n\n\n\n-- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, The Zero Day Initiative (ZDI) represents\na best-of-breed model for rewarding security researchers for responsibly\ndisclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is\nused. TippingPoint does not re-sell the vulnerability details or any\nexploit code. Instead, upon notifying the affected product vendor,\nTippingPoint provides its customers with zero day protection through\nits intrusion prevention technology. Explicit details regarding the\nspecifics of the vulnerability are not exposed to any parties until\nan official vendor patch is publicly available. Furthermore, with the\naltruistic aim of helping to secure a broader user base, TippingPoint\nprovides this vulnerability information confidentially to security\nvendors (including competitors) who have a vulnerability protection or\nmitigation product. \n\nOur vulnerability disclosure policy is available online at:\n\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\n\nFollow the ZDI on Twitter:\n\n http://twitter.com/thezdi\n\n. Apple has\n released updates to address these vulnerabilities. \n\n\nI. Apple has released updates to address these\n vulnerabilities. \n\n\nII. \n\n\nIII. This advisory describes any known issues related to the\n updates and the specific impacts for each vulnerability. \n Administrators are encouraged to note these issues and impacts and\n test for any potentially adverse effects before wide-scale\n deployment. \n\n\nIV. Please send\n email to \u003ccert@cert.org\u003e with \"TA11-286A Feedback VU#421739\" in\n the subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2011 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\nRevision History\n\n October 13, 2011: Initial release\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (GNU/Linux)\n\niQEVAwUBTpb8zj/GkGVXE7GMAQI21Af/SHWzIangqPW9vtuG/MQWSBMy9nG4wIZS\nDUEAWBEMPTKF3fLrIy6TVpRLN3q/q4dCYXzM4lec4IzKvEbV/bUyg15xEfYdxB0v\ns/vARGNwf7tjSbjo+PaHLuSZ1HLn/GLO3CXaf+ut/Kb8y9Fsir5klMgrCX/N0JkY\ndLoV9R6zGs1aQzmF9ULB1IQ2/lUkg6CGnyARh0prfhRFwKfu7NZXb8yz5ex68q6V\nNF6j9l+XK0Cl4K7R+0ESD4e47jLCg6iN175O8VzrlxiRvBRAyTaFycdMB4uSkmii\nxu8SqU2QFhsIJy8J+i1Bb6kuWkaxAnUbxO4tRrmXoqTXl9m0CtpnWA==\n=3Wp2\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\nOvum says ad hoc tools are out-dated. The best practice approach?\nFast vulnerability intelligence, threat handling, and setup in one tool. \n\nRead the new report on the Secunia VIM:\nhttp://secunia.com/products/corporate/vim/ovum_2011_request/ \n\n----------------------------------------------------------------------\n\nTITLE:\nApple iTunes Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA46339\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46339/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46339\n\nRELEASE DATE:\n2011-10-13\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46339/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46339/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46339\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nApple has reported multiple vulnerabilities in Apple iTunes, which\ncan be exploited by malicious people to disclose sensitive\ninformation, manipulate certain data, conduct cross-site scripting\nand spoofing attacks, bypass certain security restrictions, and\ncompromise a user\u0027s system. \n\nMultiple vulnerabilities exist within the WebKit and ColorSync\ncomponents. \n\nFor more information:\nSA44375 (#8)\nSA45097 (#2)\nSA45325\nSA45498\nSA45698 (#2)\nSA46049 (#11)\nSA46171 (#6)\n\n1) An error in the CoreFoundation component when handling string\ntokenization can be exploited to corrupt memory via a MitM\n(Man-in-the-Middle) attack. \n\n2) An error in the CoreAudio component when handling Advanced Audio\nCoding (AAC) streams can be exploited to cause a buffer overflow. \n\n4) Some errors in the WebKit component when using the\nAddressSanitizer can be exploited to corrupt memory. \n\n5) Multiple unspecified errors in the WebKit component can be\nexploited to corrupt memory. \n\nSOLUTION:\nUpdate to version 10.5. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Reported by the vendor. \n\nThe vendor also credits:\n2) Luigi Auriemma via ZDI. \n3) Damian Put via ZDI. \n4) Cris Neckar, Adam Barth, and Abhishek Arya (Inferno), Google\nChrome Security Team. \n\nThe vendor provides a bundled list of credits for vulnerabilities in\n#5:\n* Cris Neckar, Google Chrome Security Team\n* Abhishek Arya (Inferno), Google Chrome Security Team\n* SkyLined, Google Chrome Security Team\n* Raman Tenneti and Philip Rogers, Google\n* Sadrul Habib Chowdhury, Chromium development community\n* Cris Neckar and Abhishek Arya (Inferno), Google Chrome Security\nTeam\n* Dimitri Glazkov, Kent Tamura, Dominic Cooney, Chromium development\ncommunity\n* Martin Barbella\n* Slawomir Blazek\n* vkouchna\n\nORIGINAL ADVISORY:\nhttp://support.apple.com/kb/HT4981\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2011-10-26-1 QuickTime 7.7.1\n\nQuickTime 7.7.1 is now available and addresses the following:\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in QuickTime\u0027s handling of\nH.264 encoded movie files. For OS X Lion systems, this issue is\naddressed in OS X Lion v10.7.2. \nCVE-ID\nCVE-2011-3219 : Damian Put working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to the\ndisclosure of memory contents\nDescription: An uninitialized memory access issue existed in\nQuickTime\u0027s handling of URL data handlers within movie files. For OS\nX Lion systems, this issue is addressed in OS X Lion v10.7.2. \nCVE-ID\nCVE-2011-3220 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An implementation issue existed in QuickTime\u0027s handling\nof the atom hierarchy within a movie file. For OS X Lion systems,\nthis issue is addressed in OS X Lion v10.7.2. \nCVE-ID\nCVE-2011-3221 : an anonymous researcher working with TippingPoint\u0027s\nZero Day Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: An attacker in a privileged network position may inject\nscript in the local domain when viewing template HTML\nDescription: A cross-site scripting issue existed in QuickTime\nPlayer\u0027s \"Save for Web\" export. The template HTML files generated by\nthis feature referenced a script file from a non-encrypted origin. An\nattacker in a privileged network position may be able to inject\nmalicious scripts in the local domain if the user views a template\nfile locally. This issue is addressed by removing the reference to an\nonline script. This issue does not affect OS X Lion systems. \nCVE-ID\nCVE-2011-3218 : Aaron Sigel of vtty.com\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted FlashPix file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in QuickTime\u0027s handling of\nFlashPix files. For OS X Lion systems, this issue is addressed in OS\nX Lion v10.7.2. \nCVE-ID\nCVE-2011-3222 : Damian Put working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in QuickTime\u0027s handling of\nFLIC files. For OS X Lion systems, this issue is addressed in OS X\nLion v10.7.2. \nCVE-ID\nCVE-2011-3223 : Matt \u0027j00ru\u0027 Jurczyk working with TippingPoint\u0027s Zero\nDay Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in\nQuickTime\u0027s handling of movie files. For OS X Lion systems, these\nissues are addressed in OS X Lion v10.7.2. \nCVE-ID\nCVE-2011-3228 : Apple\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted PICT file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow issue existed in the handling of\nPICT files. \nCVE-ID\nCVE-2011-3247 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A signedness issue existed in the handling of font\ntables embedded in QuickTime movie files. \nCVE-ID\nCVE-2011-3248 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow issue existed in the handling of FLC\nencoded movie files. \nCVE-ID\nCVE-2011-3249 : Matt \u0027j00ru\u0027 Jurczyk working with TippingPoint\u0027s Zero\nDay Initiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow issue existed in the handling of\nJPEG2000 encoded movie files. \nCVE-ID\nCVE-2011-3250 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Windows 7, Vista, XP SP2 or later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\nTKHD atoms in QuickTime movie files. \nCVE-ID\nCVE-2011-3251 : Damian Put working with TippingPoint\u0027s Zero Day\nInitiative\n\n\nQuickTime 7.7.1 may be obtained from the QuickTime Downloads site:\nhttp://www.apple.com/quicktime/download/\n\nThe download file is named: \"QuickTimeInstaller.exe\"\nIts SHA-1 digest is: 9bf0e5da752663d1b8d8a415f938dc2d3b04eee5\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.16 (Darwin)\n\niQEcBAEBAgAGBQJOqH2VAAoJEGnF2JsdZQeecGQIAIY4HmK221wqZEuxnTFYZdnv\nCFnX2vc1cn22XODSXQV5x38zEd5RV1X/Crh3QcG/rSmhOKxckCJG5G4cRk9dNmdu\nvpaU3+cceDTWieSmgwZX0QRScqdn6+rMHzJqWnR8i1E+bfDKhB5fl4eB1IGmRnAk\nW4wZvUd06pMwSKm35d7whBBsiIz0gmIGz2Ktf7ft6wObHyy0Gq/eHWZFm2/VdX1p\nZ+gXnbKTsYsgSeE33IGqgbA6+yFpA41ueKqR6084n6aUWdpb7GHpTNI5v3h7Sq53\ni3BxkfDIOpgHyd7/G/b1Rmmv9k6fO64GCyvvuxr6laIstfCPYqROoajx1tsFStU=\n=LmVu\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2011-3219" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "db": "ZDI", "id": "ZDI-11-303" }, { "db": "BID", "id": "50068" }, { "db": "VULHUB", "id": "VHN-51164" }, { "db": "PACKETSTORM", "id": "106264" }, { "db": "PACKETSTORM", "id": "105790" }, { "db": "PACKETSTORM", "id": "105723" }, { "db": "PACKETSTORM", "id": "106335" } ], "trust": 2.97 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-51164", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-51164" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3219", "trust": 3.7 }, { "db": "ZDI", "id": "ZDI-11-303", "trust": 1.1 }, { "db": "OSVDB", "id": "76374", "trust": 1.1 }, { "db": "USCERT", "id": "TA11-286A", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2011-002424", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1314", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201110-232", "trust": 0.7 }, { "db": "SECUNIA", "id": "46339", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2011-10-11-1", "trust": 0.6 }, { "db": "NSFOCUS", "id": "18056", "trust": 0.6 }, { "db": "NSFOCUS", "id": "17909", "trust": 0.6 }, { "db": "BID", "id": "50068", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "106335", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "106264", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-51164", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "105790", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "105723", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-303" }, { "db": "VULHUB", "id": "VHN-51164" }, { "db": "BID", "id": "50068" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "db": "PACKETSTORM", "id": "106264" }, { "db": "PACKETSTORM", "id": "105790" }, { "db": "PACKETSTORM", "id": "105723" }, { "db": "PACKETSTORM", "id": "106335" }, { "db": "CNNVD", "id": "CNNVD-201110-232" }, { "db": "NVD", "id": "CVE-2011-3219" } ] }, "id": "VAR-201110-0426", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-51164" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:16:55.238000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4981", "trust": 1.5, "url": "http://support.apple.com/kb/HT4981" }, { "title": "HT5002", "trust": 0.8, "url": "http://support.apple.com/kb/HT5002" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-303" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-51164" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "db": "NVD", "id": "CVE-2011-3219" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://support.apple.com/kb/ht4981" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00000.html" }, { "trust": 1.4, "url": "http://support.apple.com/kb/ht5016" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht5002" }, { "trust": 1.1, "url": "http://osvdb.org/76374" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a17228" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3219" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta11-286a" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu706419" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu971123" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3219" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/techalerts/ta11-286a.html" }, { "trust": 0.6, "url": "http://secunia.com/advisories/46339" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/18056" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/17909" }, { "trust": 0.3, "url": "http://www.apple.com/itunes/" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "/archive/1/520068" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-11-303/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3219" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/disclosure_policy/" }, { "trust": 0.1, "url": "http://twitter.com/thezdi" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/zdi-11-303" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta11-286a.html\u003e" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1338\u003e" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht5002\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46339/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46339" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46339/" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/ovum_2011_request/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3223" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3228" }, { "trust": 0.1, "url": "http://www.apple.com/quicktime/download/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3221" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3251" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3248" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3220" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3218" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3249" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3250" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3247" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-303" }, { "db": "VULHUB", "id": "VHN-51164" }, { "db": "BID", "id": "50068" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "db": "PACKETSTORM", "id": "106264" }, { "db": "PACKETSTORM", "id": "105790" }, { "db": "PACKETSTORM", "id": "105723" }, { "db": "PACKETSTORM", "id": "106335" }, { "db": "CNNVD", "id": "CNNVD-201110-232" }, { "db": "NVD", "id": "CVE-2011-3219" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-11-303" }, { "db": "VULHUB", "id": "VHN-51164" }, { "db": "BID", "id": "50068" }, { "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "db": "PACKETSTORM", "id": "106264" }, { "db": "PACKETSTORM", "id": "105790" }, { "db": "PACKETSTORM", "id": "105723" }, { "db": "PACKETSTORM", "id": "106335" }, { "db": "CNNVD", "id": "CNNVD-201110-232" }, { "db": "NVD", "id": "CVE-2011-3219" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-26T00:00:00", "db": "ZDI", "id": "ZDI-11-303" }, { "date": "2011-10-12T00:00:00", "db": "VULHUB", "id": "VHN-51164" }, { "date": "2011-10-11T00:00:00", "db": "BID", "id": "50068" }, { "date": "2011-10-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "date": "2011-10-26T23:12:17", "db": "PACKETSTORM", "id": "106264" }, { "date": "2011-10-14T05:50:20", "db": "PACKETSTORM", "id": "105790" }, { "date": "2011-10-12T05:48:44", "db": "PACKETSTORM", "id": "105723" }, { "date": "2011-10-28T21:11:08", "db": "PACKETSTORM", "id": "106335" }, { "date": "2011-10-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-232" }, { "date": "2011-10-12T18:55:01.847000", "db": "NVD", "id": "CVE-2011-3219" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-26T00:00:00", "db": "ZDI", "id": "ZDI-11-303" }, { "date": "2017-09-19T00:00:00", "db": "VULHUB", "id": "VHN-51164" }, { "date": "2015-03-19T09:10:00", "db": "BID", "id": "50068" }, { "date": "2011-10-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002424" }, { "date": "2011-10-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-232" }, { "date": "2024-11-21T01:30:00.527000", "db": "NVD", "id": "CVE-2011-3219" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "106264" }, { "db": "CNNVD", "id": "CNNVD-201110-232" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple iTunes Used in CoreMedia Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002424" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-232" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.