Apple Quicktime Memory Corruption
The Apple QuickTime player does not properly parse .fpx media files, which causes a memory corruption by opening a malformed file with an invalid value located in PoC repro.fpx at offset 0x49. Tested vulnerable are versions 7.6.8 (1675) and 7.6.6 (1671).
Tags: Apple, invalid-valueApple Security Advisory 2010-12-16
Apple Security Advisory 2010-12-16-1 – Multiple vulnerabilities have been addressed in Time Capsule and the Airport Base Station.
Tags: Apple, apple-security, SecurityHonggfuzz CLI Fuzzer 0.1
Honggfuzz is a general-purpose, easy-to-use fuzzer with interesting analysis options. Given a starting corpus of test files, Honggfuzz supplies and modifies input to a test program and utilizes the ptrace() API/POSIX signal interface to detect and log crashes. It works on Linux, FreeBSD and Mac OS X.
Tags: api, modifies-input, starting-corpus, works-on-linuxOstinato Traffic Generator 0.3 Mac OS X
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be “Wireshark in Reverse” and thus become complementary to Wireshark. This is the Mac OS X release.
Tags: become-complementary, gui, reverse, traffic-generatorAanval Intrusion Detection Tool 6
Aanval is the industry’s most comprehensive snort and syslog intrusion detection, correlation and management console. Aanval is designed specifically to scale from small single sensor installations to global enterprise deployments. Aanval is browser based and designed to work on all current variants of UNIX, Linux and Mac OS X.
Tags: browser-based, industry, linux, small-singleZero Day Initiative Advisory 10-262
Zero Day Initiative Advisory 10-262 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses directBitsRect records within a .pict file. When decompressing data within this structure, the application will allocate space for the target buffer using fields described within the file and then use a different length to decompress the total data from the file. This can lead to code execution under the context of the application.
Tags: Application, exploit, file, Vulnerability