The version of QuickTime installed on the remote Windows host is older than 7.7.4. It is, therefore, reportedly affected by the following vulnerabilities :
Buffer overflow vulnerabilities exist in the handling of ‘dref’ atoms, ‘enof’ atoms, ‘mvhd’ atoms, FPX files, MP3 files, H.263 and H.264 encoded movie files, Sorenson encoded movie files, and JPEG encoded data.
(CVE-2013-0986, CVE-2013-0988, CVE-2013-0989, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1021, CVE-2013-1022)
Memory corruption vulnerabilities exist in the handling of QTIF files, TeXML files, and JPEG encoded data.
(CVE-2013-0987, CVE-2013-1015, CVE-2013-1020)
Successful exploitation of these issues could result in program termination or arbitrary code execution, subject to the user’s privileges.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(66636);
script_version("1.11");
script_cvs_date("Date: 2018/11/15 20:50:28");
script_cve_id(
"CVE-2013-0986",
"CVE-2013-0987",
"CVE-2013-0988",
"CVE-2013-0989",
"CVE-2013-1015",
"CVE-2013-1016",
"CVE-2013-1017",
"CVE-2013-1018",
"CVE-2013-1019",
"CVE-2013-1020",
"CVE-2013-1021",
"CVE-2013-1022"
);
script_bugtraq_id(
60092,
60097,
60098,
60099,
60100,
60101,
60102,
60103,
60104,
60108,
60109,
60110
);
script_xref(name:"APPLE-SA", value:"APPLE-SA-2013-05-22-1");
script_name(english:"QuickTime < 7.7.4 Multiple Vulnerabilities (Windows)");
script_summary(english:"Checks version of QuickTime on Windows");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Windows host contains an application that may be affected
by multiple vulnerabilities."
);
script_set_attribute(
attribute:"description",
value:
"The version of QuickTime installed on the remote Windows host is older
than 7.7.4. It is, therefore, reportedly affected by the following
vulnerabilities :
- Buffer overflow vulnerabilities exist in the handling of
'dref' atoms, 'enof' atoms, 'mvhd' atoms, FPX files, MP3
files, H.263 and H.264 encoded movie files, Sorenson
encoded movie files, and JPEG encoded data.
(CVE-2013-0986, CVE-2013-0988, CVE-2013-0989,
CVE-2013-1016, CVE-2013-1017, CVE-2013-1018,
CVE-2013-1019, CVE-2013-1021, CVE-2013-1022)
- Memory corruption vulnerabilities exist in the handling
of QTIF files, TeXML files, and JPEG encoded data.
(CVE-2013-0987, CVE-2013-1015, CVE-2013-1020)
Successful exploitation of these issues could result in program
termination or arbitrary code execution, subject to the user's
privileges."
);
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-110/");
script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-111/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-112/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-113/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-114/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-115/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-116/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-117/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-118/");
script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-119/");
script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT202735");
script_set_attribute(attribute:"see_also", value:"https://lists.apple.com/archives/security-announce/2013/May/msg00001.html");
script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/526669/30/0/threaded");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-080/");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-110/");
script_set_attribute(attribute:"solution", value:"Upgrade to QuickTime 7.7.4 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Apple Quicktime 7 Invalid Atom Length Buffer Overflow');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/22");
script_set_attribute(attribute:"patch_publication_date", value:"2013/05/22");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/05/28");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
script_dependencies("quicktime_installed.nasl");
script_require_keys("SMB/QuickTime/Version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
kb_base = "SMB/QuickTime/";
version = get_kb_item_or_exit(kb_base+"Version");
path = get_kb_item_or_exit(kb_base+"Path");
version_ui = get_kb_item(kb_base+"Version_UI");
if (isnull(version_ui)) version_report = version;
else version_report = version_ui;
fixed_version = "7.74.80.86";
fixed_version_ui = "7.7.4 (1680.86)";
if (ver_compare(ver:version, fix:fixed_version) == -1)
{
port = get_kb_item("SMB/transport");
if (!port) port = 445;
if (report_verbosity > 0)
{
report =
'\n Path : '+path+
'\n Installed version : '+version_report+
'\n Fixed version : '+fixed_version_ui+'\n';
security_hole(port:port, extra:report);
}
else security_hole(port);
exit(0);
}
audit(AUDIT_INST_PATH_NOT_VULN, 'QuickTime Player', version_report, path);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0986
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1018
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1019
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1021
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1022
www.zerodayinitiative.com/advisories/ZDI-13-111/
www.zerodayinitiative.com/advisories/ZDI-13-119/
lists.apple.com/archives/security-announce/2013/May/msg00001.html
support.apple.com/en-us/HT202735
www.securityfocus.com/archive/1/526669/30/0/threaded
www.zerodayinitiative.com/advisories/ZDI-13-080/
www.zerodayinitiative.com/advisories/ZDI-13-110/
www.zerodayinitiative.com/advisories/ZDI-13-112/
www.zerodayinitiative.com/advisories/ZDI-13-113/
www.zerodayinitiative.com/advisories/ZDI-13-114/
www.zerodayinitiative.com/advisories/ZDI-13-115/
www.zerodayinitiative.com/advisories/ZDI-13-116/
www.zerodayinitiative.com/advisories/ZDI-13-117/
www.zerodayinitiative.com/advisories/ZDI-13-118/