iDEFENSE Security Advisory 2010-12-07.1
iDefense Security Advisory 12.07.10 – Remote exploitation of a memory corruption vulnerability in Apple Inc.’s QuickTime media player could allow attackers to execute arbitrary code in the context of the targeted user. The vulnerability specifically exists in the way specially crafted PICT image files are handled by the QuickTime PictureViewer. When processing specially crafted PICT image files, Quicktime PictureViewer uses a set value from the file to control the length of a byte swap operation. The byte swap operation is used to convert big endian data to little endian data. QuickTime fails to validate the length value properly before using it. When a length value is larger than the actual buffer size supplied, it will corrupt heap memory beyond the allocated buffer, which could lead to an exploitable condition. QuickTime Player versions prior to 7.6.9 are vulnerable.
View post:
iDEFENSE Security Advisory 2010-12-07.1
Post a reply
You must be logged in to post a comment.