Vulnerability Note VU#112553

Apple QuickTime Player for Windows contains buffer overflow in processing of overly long QuickTime URLs

Original Release date: 01 Apr 2003 | Last revised: 01 Apr 2003

Overview

Apple's QuickTime Player is a player for files and streaming media in the QuickTime format. Versions of the player are available for both the Microsoft Windows and Apple MacOS platforms. A flaw in the version for Windows could allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

A buffer overflow exists in the QuickTime Player for Windows' handling of overly long URL of the type quicktime://... A specially crafted URL consisting of a long string of characters can cause the QuickTime Player to crash or allow an attacker to execute arbitrary code of their choosing with the privileges of the user running the QuickTime Player.

The URL containing the exploit code may be hosted on a webpage, introduced via HTML email, or presented to the user in another fashion that encourages them to browse to it.

Impact

If the QuickTime player software is instructed to load a URL that is specially crafted by an attacker, arbitrary code can be executed under the privileges of the QuickTime user. This crafted URL may be supplied on a webpage or in email for the victim to select, or some other means designed to encourage them to invoke the QuickTime Player using the exploit URL.

Solution

Apply a patch from the vendor

Apple has released a patch to address this vulnerability; please see the vendor section of this document for further details.

Removing the QuickTime handler from the web browser or removing the HKEY_CLASSES_ROOT/quicktime registry key may prevent automatic exploitation through HTML pages.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer Inc.Affected-01 Apr 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered by the staff at Texonet and reported by iDEFENSE Labs.

This document was written by Chad R Dougherty.

Other Information

  • CVE IDs: CAN-2003-0168
  • Date Public: 31 Mar 2003
  • Date First Published: 01 Apr 2003
  • Date Last Updated: 01 Apr 2003
  • Severity Metric: 15.68
  • Document Revision: 6

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.