HTTP: Apple QuickTime crgn Atom Parsing Memory Corruption

This signature detects attempts to exploit a known vulnerability in Apple QuickTime Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Extended Description

Apple QuickTime is prone to multiple remote vulnerabilities that may allow remote attackers to obtain sensitive information, execute arbitrary code, and carry out denial-of-service attacks. These issues arise when the application handles specially crafted Java applets, image files, and movie files. Successful exploits may allow attackers to obtain sensitive information, gain remote unauthorized access in the context of a vulnerable user, and trigger a denial-of-service condition. Versions prior to QuickTime 7.4.5 are affected by these vulnerabilities.

Affected Products

Apple tv,Apple quicktime_player

References

BugTraq: 28583

CVE: CVE-2008-1017

Short Name
HTTP:STC:DL:QT-CRGN-ATOM
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apple Atom CVE-2008-1017 Corruption Memory Parsing QuickTime bid:28583 crgn
Release Date
09/29/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3731
False Positive
Unknown
Vendors

Apple

CVSS Score

6.8

Found a potential security threat?