|
Answer» TITLE: Apple QuickTime RTSP "Content-Type" Header Buffer Overflow
SECUNIA ADVISORY ID: SA27755
VERIFY ADVISORY: http://secunia.com/advisories/27755/
CRITICAL: Extremely critical
IMPACT: System access
WHERE: >From remote
SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/
DESCRIPTION: h07 has discovered a vulnerability in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a BOUNDARY error when processing RTSP replies and can be exploited to CAUSE a stack-based buffer overflow via a SPECIALLY crafted RTSP reply containing an overly long "Content-Type" header.
Successful EXPLOITATION allows execution of arbitrary code and requires that the user is e.g. tricked into opening a malicious QTL file or visiting a malicious web site.
The vulnerability is confirmed in version 7.3. Other versions may also be affected.
NOTE: A working exploit is publicly available.
SOLUTION: Do not browse untrusted websites, follow untrusted links, nor open untrusted QTL files.
|