Lucene search

K
nessusThis script is Copyright (C) 2009-2020 Tenable Network Security, Inc.QUICKTIME_762.NASL
HistoryJun 02, 2009 - 12:00 a.m.

QuickTime < 7.6.2 Multiple Vulnerabilities (Windows)

2009-06-0200:00:00
This script is Copyright (C) 2009-2020 Tenable Network Security, Inc.
www.tenable.com
14

The version of QuickTime installed on the remote Windows host is older than 7.6.2. Such versions contain several vulnerabilities :

  • An integer underflow in QuickTime’s handling of PICT images may result in a heap-based buffer overflow and, in turn, to an application crash or arbitrary code execution. (CVE-2009-0010)

  • A heap-based buffer overflow in QuickTime’s handling of MS ADPCM encoded audio data may lead to an application crash or arbitrary code execution. (CVE-2009-0185)

  • A memory corruption issue in QuickTime’s handling of Sorenson 3 video files may lead to an application crash or arbitrary code execution. (CVE-2009-0188)

  • A heap-basded buffer overflow in QuickTime’s handling of FLC compression files may lead to an application crash or arbitrary code execution. (CVE-2009-0951)

  • A buffer overflow in QuickTime’s handling of compressed PSD image files may lead to an application crash or arbitrary code execution. (CVE-2009-0952)

  • A heap-based buffer overflow in QuickTime’s handling of PICT image files may lead to an application crash or arbitrary code execution. (CVE-2009-0953)

  • A heap-based buffer overflow in QuickTime’s handling of Clipping Region (CRGN) atom types in a movie file may lead to an application crash or arbitrary code execution. (CVE-2009-0954)

  • A sign extension issue in QuickTime’s handling of image description atoms in an Apple video file may lead to an application crash or arbitrary code execution.
    (CVE-2009-0955)

  • An uninitialized memory access issue in QuickTime’s handling of movie files may lead to an application crash or arbitrary code execution. (CVE-2009-0956)

  • A heap-based buffer overflow in QuickTime’s handling of JP2 image files may lead to an application crash or arbitrary code execution. (CVE-2009-0957)

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(38988);
  script_version("1.18");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/07/31");

  script_cve_id(
    "CVE-2009-0010",
    "CVE-2009-0185",
    "CVE-2009-0188",
    "CVE-2009-0951",
    "CVE-2009-0952",
    "CVE-2009-0953",
    "CVE-2009-0954",
    "CVE-2009-0955",
    "CVE-2009-0956",
    "CVE-2009-0957"
  );
  script_bugtraq_id(
    34938,
    35159,
    35161,
    35162,
    35163,
    35164,
    35165,
    35166,
    35167,
    35168
  );

  script_name(english:"QuickTime < 7.6.2 Multiple Vulnerabilities (Windows)");

  script_set_attribute( attribute:"synopsis", value:
"The remote Windows host contains an application that is affected by
multiple vulnerabilities."  );
  script_set_attribute( attribute:"description", value:
"The version of QuickTime installed on the remote Windows host is older
than 7.6.2.  Such versions contain several vulnerabilities :

  - An integer underflow in QuickTime's handling of PICT
    images may result in a heap-based buffer overflow and,
    in turn, to an application crash or arbitrary code
    execution. (CVE-2009-0010)

  - A heap-based buffer overflow in QuickTime's handling of
    MS ADPCM encoded audio data may lead to an application
    crash or arbitrary code execution. (CVE-2009-0185)

  - A memory corruption issue in QuickTime's handling of
    Sorenson 3 video files may lead to an application crash
    or arbitrary code execution. (CVE-2009-0188)

  - A heap-basded buffer overflow in QuickTime's handling of
    FLC compression files may lead to an application crash
    or arbitrary code execution. (CVE-2009-0951)

  - A buffer overflow in QuickTime's handling of compressed
    PSD image files may lead to an application crash or
    arbitrary code execution. (CVE-2009-0952)

  - A heap-based buffer overflow in QuickTime's handling of
    PICT image files may lead to an application crash or
    arbitrary code execution. (CVE-2009-0953)

  - A heap-based buffer overflow in QuickTime's handling of
    Clipping Region (CRGN) atom types in a movie file may
    lead to an application crash or arbitrary code
    execution. (CVE-2009-0954)

  - A sign extension issue in QuickTime's handling of image
    description atoms in an Apple video file may lead to an
    application crash or arbitrary code execution.
    (CVE-2009-0955)

  - An uninitialized memory access issue in QuickTime's
    handling of movie files may lead to an application
    crash or arbitrary code execution. (CVE-2009-0956)

  - A heap-based buffer overflow in QuickTime's handling of
    JP2 image files may lead to an application crash or
    arbitrary code execution. (CVE-2009-0957)"  );
  script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT3591");
  # http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?63ea434a");
  script_set_attribute(attribute:"solution", value:
"Upgrade to QuickTime 7.6.2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2009-0010");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");
  script_cwe_id(94, 119, 189, 399);

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/05/13");
  script_set_attribute(attribute:"plugin_publication_date", value: "2009/06/02");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2009-2020 Tenable Network Security, Inc.");
  script_dependencies("quicktime_installed.nasl");
  script_require_keys("SMB/QuickTime/Version");
  exit(0);
}


include("global_settings.inc");


version_ui = get_kb_item("SMB/QuickTime/Version_UI");
version = get_kb_item("SMB/QuickTime/Version");
if (isnull(version)) exit(0);

ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

if (
  ver[0] < 7 ||
  (
    ver[0] == 7 &&
    (
      ver[1] < 62 ||
      (ver[1] == 62 && ver[2] < 14)
    )
  )
)
{
  if (isnull(version_ui))
    version_ui = version;

  report = "\nQuickTime " + version_ui + " is currently installed on the remote host.\n";

  security_report_v4(severity:SECURITY_HOLE, port:get_kb_item("SMB/transport"), extra:report);
}
VendorProductVersionCPE
applequicktimecpe:/a:apple:quicktime