Lucene search

K
HistoryJun 11, 2013 - 12:00 a.m.

Apple QuickTime TeXML textBox Element Parsing Remote Code Execution Vulnerability

2013-06-1100:00:00
www.zerodayinitiative.com
11

0.084 Low

EPSS

Percentile

94.4%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Apple QuickTime handles textBox elements within a TeXML file. Specifically, the code within QuickTime.qts does not properly validate the coordinate values of the x and y attributes. By providing specially crafted coordinate values, the code can be made to write data ahead of a buffer, leading to memory corruption. This memory corruption could lead to remote code execution under that context of the current process.