QuickTime < 7.6.8 Multiple Vulnerabilities (Windows)

high Log Correlation Engine Plugin ID 801185

Synopsis

The remote host contains an application that is vulnerable to multiple attack vectors.

Description

Versions of QuickTime earlier than 7.6.8 are potentially affected by multiple vulnerabilities :

An input validation issue in the QTPlugin.ocx ActiveX control could allow an attacker to force the application to jump to a location in memory controlled by the attacker through the optional '_Marshaled_pUnk' parameter and in turn to execute remote code under the context of the user running the web browser. (CVE-2010-1818)

- QuickTime Picture Viewer uses a fixed path to look for specific files or libraries, such as 'cfnetwork.dll' and 'corefoundation.dll', and this path includes directories that may not be trusted or under user control. If an attacker places a maliciously crafted DLL in the same directory as an image file, opening the image file with QuickTime Picture Viewer will cause the malicious DLL to be loaded. (CVE-2010-1819)

Solution

Upgrade to QuickTime 7.6.8 or later.

See Also

zerodayinitiative.com/advisories/ZDI-10-168

archives.neohapsis.com/archives/bugtraq/2010-08/0373.html

http://.reversemode.com/index.php?option=com_content&amp;task=view&amp;id=69&amp;Itemid=1

support.apple.com/kb/HT4339

lists.apple.com/archives/security-announce/2010/sep/msg00003.html

Plugin Details

Severity: High

ID: 801185

Family: Web Clients

Published: 9/16/2010

Nessus ID: 49260

Vulnerability Information

Patch Publication Date: 9/15/2010

Vulnerability Publication Date: 8/30/2010

Exploitable With

CANVAS (CANVAS)

Metasploit (Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution)

Reference Information

CVE: CVE-2010-1818, CVE-2010-1819

BID: 42774, 42841