Apple QuickTime TeXML Style Element Parsing Buffer Overflow

2012-07-09T00:00:00
ID SAINT:F3204D4D05C84F438515D52A9B5BD8EE
Type saint
Reporter SAINT Corporation
Modified 2012-07-09T00:00:00

Description

Added: 07/09/2012
CVE: CVE-2012-0663
BID: 53571
OSVDB: 81934

Background

QuickTime is a media player for Windows and Mac OS platforms.

Problem

Apple QuickTime 7.7.1 and earlier versions are vulnerable to buffer overflow when parsing XML elements within a TeXML file. The QuickTime3GPP.qtx QuickTime Extension image file does not properly validate the length of data within certain sub-fields. By enticing a user to open a specially crafted TeXML file, a remote attacker could exploit this vulnerability to execute arbitrary code in the context of the user.

Resolution

Upgrade to Apple QuickTime 7.7.2 or later.

References

<http://www.zerodayinitiative.com/advisories/ZDI-12-107/>
<http://support.apple.com/kb/HT5261>

Limitations

This exploit has been tested against Apple QuickTime 7.7.1 on Windows XP SP3 English (DEP OptIn).

The user must open the exploit file in a vulnerable version of Apple QuickTime.

Platforms

Windows