Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:QT-PDAT

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Apple QuickTime PDAT Atom Parsing Buffer Overflow

Release Date

2010/10/25

Update Number

1798

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Apple QuickTime PDAT Atom Parsing Buffer Overflow


This signature detects attempts to exploit a known vulnerability in the Apple Quicktime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Extended Description

Apple QuickTime is prone to multiple remote vulnerabilities that may allow remote attackers to execute arbitrary code and carry out denial-of-service attacks. These issues arise when the application handles specially crafted PICT image files, movies, and QTVR movies. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user and to trigger a denial-of-service condition. Versions prior to QuickTime 7.5.5 are affected. NOTE: Two issues that were previously covered in this BID were given their own records to better document the details: - CVE-2008-3626 was moved to BID 31546 ('Apple QuickTime 'STSZ' Atoms Memory Corruption Vulnerability') - CVE-2008-3629 was moved to BID 31548 ('Apple QuickTime PICT Denial of Service Vulnerability').

Affected Products

  • Apple Mac OS X 10.4.1
  • Apple Mac OS X 10.4.10
  • Apple Mac OS X 10.4.11
  • Apple Mac OS X 10.4.2
  • Apple Mac OS X 10.4.3
  • Apple Mac OS X 10.4.4
  • Apple Mac OS X 10.4.5
  • Apple Mac OS X 10.4.6
  • Apple Mac OS X 10.4.7
  • Apple Mac OS X 10.4.8
  • Apple Mac OS X 10.4.9
  • Apple Mac OS X 10.5
  • Apple Mac OS X 10.5.1
  • Apple Mac OS X 10.5.2
  • Apple Mac OS X 10.5.3
  • Apple Mac OS X 10.5.4
  • Apple Mac OS X Server 10.4.0
  • Apple Mac OS X Server 10.4.1
  • Apple Mac OS X Server 10.4.10
  • Apple Mac OS X Server 10.4.11
  • Apple Mac OS X Server 10.4.2
  • Apple Mac OS X Server 10.4.3
  • Apple Mac OS X Server 10.4.4
  • Apple Mac OS X Server 10.4.5
  • Apple Mac OS X Server 10.4.6
  • Apple Mac OS X Server 10.4.7
  • Apple Mac OS X Server 10.4.8
  • Apple Mac OS X Server 10.4.9
  • Apple Mac OS X Server 10.5
  • Apple Mac OS X Server 10.5.1
  • Apple Mac OS X Server 10.5.2
  • Apple Mac OS X Server 10.5.3
  • Apple Mac OS X Server 10.5.4
  • Apple QuickTime Player 7.0.0
  • Apple QuickTime Player 7.0.1
  • Apple QuickTime Player 7.0.2
  • Apple QuickTime Player 7.0.3
  • Apple QuickTime Player 7.0.4
  • Apple QuickTime Player 7.1
  • Apple QuickTime Player 7.1.1
  • Apple QuickTime Player 7.1.2
  • Apple QuickTime Player 7.1.3
  • Apple QuickTime Player 7.1.4
  • Apple QuickTime Player 7.1.5
  • Apple QuickTime Player 7.1.6
  • Apple QuickTime Player 7.2
  • Apple QuickTime Player 7.3
  • Apple QuickTime Player 7.3.1
  • Apple QuickTime Player 7.3.1.70
  • Apple QuickTime Player 7.4
  • Apple QuickTime Player 7.4.1
  • Apple QuickTime Player 7.4.5
  • Apple QuickTime Player 7.5

References

  • BugTraq: 31086
  • CVE: CVE-2008-3625

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out