search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple QuickTime remote command execution vulnerability

Vulnerability Note VU#751808

Original Release Date: 2007-09-13 | Last Revised: 2007-10-04

Overview

Apple QuickTime contains a vulnerability that may allow an attacker to pass arbitrary commands to other applications.

Description

Apple QuickTime is a media player that is available for Microsoft Windows and Apple OS X. Apple QuickTime includes browser plugins for Internet Explorer, Safari, and Netscape-compatible browsers.

QuickTime includes the ability for developers to control how QuickTime movies are launched, what controls are displayed to the user, and other actions. To specify these parameters, developers can create QuickTime link (.qtl) files. QuickTime link files can be embedded in web pages and launched automatically when a user visits a website.

The qtnext parameter can be used in QuickTime link files to specify the url of a multimedia file to load and play. The multimedia file may be hosted on a web page or stored locally.

Apple QuickTime incorrectly determines the command line used to launch the default web browser on Microsoft Windows systems. Rather than using the ShellExecute method, QuickTime determines the default handler for .HTM files and then crafts its own command line for the registered application. Any protective flags in the registered file handler are stripped out by QuickTime.

Current proof-of-concept code targets systems where Mozilla Firefox is the default handler for .HTM files. Other applications are also affected by this vulnerability, although the impact may vary based on what command line parameters the application accepts.

Impact

By convincing a user to open a specially crafted QuickTime file, a remote, unauthenticated attacker may be able execute arbitrary commands on a vulnerable system.

Solution

Apple has released an update to address this issue. Mozilla has released Firefox 2.0.0.7 which reduces the impact of this vulnerability.

Restrict access to QuickTime Movies

Until updates can be applied, the following workarounds may mitigate this vulnerability. Some web sites may allow anonymous users to upload QuickTime movies that exploit this vulnerability.

Workarounds for users

    • Mozilla has released Firefox 2.0.0.7 which may prevent exploitation of this vulnerability by removing Firefox's ability to run arbitrary scripts which are provided by command line arguments. Users are encouraged to upgrade as soon as possible.
    • Using the NoScript Firefox extension to whitelist web sites that can run scripts and access installed plugins will mitigate this vulnerability. See the NoScript FAQ for more information.
    • Running Firefox with a limited user account may prevent an attacker from accessing or overwriting files that the limited user account does not have write access to.

Workarounds for administrators
    • Proxy servers or intrusion prevention systems may be able to filter QuickTime files and partially mitigate this vulnerability. Note that this workaround is not likely to mitigate or stop all attack vectors.

Vendor Information

751808
 
Affected   Unknown   Unaffected

Apple Computer, Inc.

Notified:  September 12, 2007 Updated:  October 04, 2007

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See http://docs.info.apple.com/article.html?artnum=306560 for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Mozilla

Notified:  September 12, 2007 Updated:  September 20, 2007

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See http://www.mozilla.org/security/announce/2007/mfsa2007-28.html for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

This vulnerability was disclosed by pdp on the GNUCITIZEN website.

This document was written by Ryan Giobbi and Will Dormann.

Other Information

CVE IDs: CVE-2007-4673
Severity Metric: 35.11
Date Public: 2007-09-12
Date First Published: 2007-09-13
Date Last Updated: 2007-10-04 13:26 UTC
Document Revision: 51

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.