HTTP: Apple QuickTime Image Descriptor Atom Parsing Memory Corruption

This signature detects attempts to exploit a known vulnerability against Apple QuickTime Player. A successful attack can lead to arbitrary code execution.

Extended Description

Apple QuickTime is prone to a memory-corruption vulnerability. An attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted movie file. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions. This issue affects versions prior to Apple QuickTime 7.4 running on Microsoft Windows Vista, Microsoft Windows XP SP2, and Mac OS X.

Affected Products

Apple quicktime_player

References

BugTraq: 27299

CVE: CVE-2008-0033

Short Name
HTTP:STC:STREAM:QT-DESC-ATOM
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apple Atom CVE-2008-0033 Corruption Descriptor Image Memory Parsing QuickTime bid:27299
Release Date
09/28/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Apple

CVSS Score

9.3

Found a potential security threat?