Subscribe via feed.

iDEFENSE Security Advisory 2010-12-07.1

Posted by deepcore on December 7, 2010 – 4:12 pm

iDefense Security Advisory 12.07.10 – Remote exploitation of a memory corruption vulnerability in Apple Inc.’s QuickTime media player could allow attackers to execute arbitrary code in the context of the targeted user. The vulnerability specifically exists in the way specially crafted PICT image files are handled by the QuickTime PictureViewer. When processing specially crafted PICT image files, Quicktime PictureViewer uses a set value from the file to control the length of a byte swap operation. The byte swap operation is used to convert big endian data to little endian data. QuickTime fails to validate the length value properly before using it. When a length value is larger than the actual buffer size supplied, it will corrupt heap memory beyond the allocated buffer, which could lead to an exploitable condition. QuickTime Player versions prior to 7.6.9 are vulnerable.

View post:
iDEFENSE Security Advisory 2010-12-07.1

Tags: , ,
This post is under “Apple, exploit, OSX security tools, Security” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.