HTTP: Apple QuickTime PDAT Atom Parsing Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Apple Quicktime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Extended Description

Apple QuickTime is prone to multiple remote vulnerabilities that may allow remote attackers to execute arbitrary code and carry out denial-of-service attacks. These issues arise when the application handles specially crafted PICT image files, movies, and QTVR movies. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user and to trigger a denial-of-service condition. Versions prior to QuickTime 7.5.5 are affected. NOTE: Two issues that were previously covered in this BID were given their own records to better document the details: - CVE-2008-3626 was moved to BID 31546 ('Apple QuickTime 'STSZ' Atoms Memory Corruption Vulnerability') - CVE-2008-3629 was moved to BID 31548 ('Apple QuickTime PICT Denial of Service Vulnerability').

Affected Products

Apple quicktime_player

References

BugTraq: 31086

CVE: CVE-2008-3625

Short Name
HTTP:STC:DL:QT-PDAT
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apple Atom Buffer CVE-2008-3625 Overflow PDAT Parsing QuickTime bid:31086
Release Date
10/26/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3735
False Positive
Unknown
Vendors

Apple

CVSS Score

9.3

Found a potential security threat?