Apple QuickTime Updates for Multiple Vulnerabilities
http://jvnrss.ise.chuo-u.ac.jp/jtg/trn/en/TRTA07-310A.html
JVNRSS based Status Tracking Notes: Apple QuickTime contains multiple vulnerabilities. Exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.JVNRSS Feasibility Study Teamjvn@jvn.jpTRTA07-310A2007-11-18T05:25+00:002007-11-07T23:22+00:002007-11-18T05:25+00:00[48Bits Advisory] QuickTime Panorama Sample Atom Heap Overflow
http://www.48bits.com/advisories/qt_pdat_heapbof.pdf
Panorama Sample Atoms Remote Heap Buffer Overflow Vulnerability (CVE-2007-4675)
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
48BitsTPTI-07-20http://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4675http://docs.info.apple.com/article.html?artnum=3068962007-11-10T13:41+00:002007-11-10T13:41+00:002007-11-10T13:41+00:00Apple QuickTime Updates for Multiple Vulnerabilities
http://www.us-cert.gov/cas/techalerts/TA07-310A.html
Via US-CERT Mailing List
Apple QuickTime contains multiple vulnerabilities. Exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
US-CERTTA07-310A2007-11-06T18:13-05:002007-11-06T18:13-05:002007-11-06T18:13-05:00Apple Releases Security Update to Address Multiple QuickTime Vulnerabilities
http://www.us-cert.gov/current/archive/2007/11/06/archive.html#apple_releases_security_update_to5
US-CERT Current Activity
Apple has released QuickTime 7.3 to address multiple vulnerabilities in QuickTime. The impacts of these vulnerabilities include arbitrary code execution and denial of service.
US-CERThttp://www.us-cert.gov/cas/techalerts/TA07-310A.html2007-11-06T15:51-04:002007-11-06T15:51-04:002007-11-06T15:51-04:00About the security content of QuickTime 7.3
http://docs.info.apple.com/article.html?artnum=306896
AppleArticle ID: 306896http://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2395http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3750http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3751http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4672http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4674http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4675http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4676http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-46772007-11-052007-11-052007-11-05Apple Quicktime Movie Stack Overflow Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-07-20
Stack Overflow Vulnerability (CVE-2007-4674)
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
Vulnerability Reported
TippingPointTPTI-07-20http://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4674http://docs.info.apple.com/article.html?artnum=3068962007-10-192007-10-192007-10-19Apple QuickTime Uncompressedfile Opcode Stack Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-068.html
PICT Image Remote Stack Buffer Overflow Vulnerability (CVE-2007-4672)
The specific flaw exists in the parsing of the pict file format. If an invalid length is specified for the UncompressedQuickTimeData opcode, a stack based buffer overflow occurs, allowing the execution of arbitrary code.
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-068http://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4672http://docs.info.apple.com/article.html?artnum=3068962007-09-142007-09-142007-09-14Apple QuickTime PICT File Poly Opcodes Heap Corruption Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-067.html
PICT Image Remote Multiple Heap Buffer Overflow Vulnerabilities (CVE-2007-4676)
The specific flaw exist in the parsing of Poly type opcodes (opcodes 0x0070-74). Due to improper handling of a malformed element in the structure heap corruption occurs. If properly constructed this can lead to code execution.
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-067http://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4676http://docs.info.apple.com/article.html?artnum=3068962007-09-142007-09-142007-09-14Apple Quicktime PICT File PackBitsRgn Parsing Heap Corruption Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-066.html
PICT Image Remote Multiple Heap Buffer Overflow Vulnerabilities (CVE-2007-4676)
The specific flaw exist in the parsing of the PackBitsRgn field (Opcode 0x0099). Due to improper handling of a malformed element in the structure, heap corruption occurs. If properly constructed this can lead to code execution running under the credentials of the user.
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-066http://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4676http://docs.info.apple.com/article.html?artnum=3068962007-09-142007-09-142007-09-14Apple QuickTime Color Table RGB Parsing Heap Corruption Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-065.html
Color Table Atom Remote Heap Buffer Overflow Vulnerability (CVE-2007-4677)
The specific flaw exists in the parsing of the CTAB atom. While reading the CTAB RGB values, an invalid color table size can cause QuickTime to write past the end of the heap chunk. This memory corruption can lead to the execution of arbitrary code.
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-065http://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4677http://docs.info.apple.com/article.html?artnum=3068962007-09-142007-09-142007-09-14Apple QuickTime Panorama Sample Atom Heap Buffer Overflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=620
Panorama Sample Atoms Remote Heap Buffer Overflow Vulnerability (CVE-2007-4675)
Vulnerability Reported
iDefensehttp://www.us-cert.gov/cas/techalerts/TA07-310A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4675http://docs.info.apple.com/article.html?artnum=3068962007-09-132007-09-132007-09-131rfPWocnaLLBG5zMBk9YKn88uuM=U2tDpIvcOhItC8kHlp7PH8pQ79A=d+U/ZnHEW8X6wkPIwl2RgZNe4yPeRw5b4XHMwmbABRjDlQbWUESzQTOQvDIc/9xm+W8fi9bc483AA4o6JbulwzrJVkWNGFtSNl0D/0xfUnnrm2fBhyDk4gXDhWsvU35Cy8FPztLPCqQ562Pw54uZGf6ygfIGi95qzQgZFdeoIwA=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