Vulnerability identifier: #VU5871
Vulnerability risk: Critical
CVSSv4.0: 7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Red]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Apple QuickTime
Client/Desktop applications /
Multimedia software
Vendor: Apple Inc.
Description
The vulnerability allows remote attackers to execute arbitrary code on the target system.
The weakness exists due to heap-based buffer overflow when processing media files. A remote attacker can create a media file with specially crafted moov atom field, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Mitigation
The vendor will not release a security patch. We recommend removing this software from your systems.
Vulnerable software versions
Apple QuickTime: 7.0
External links
https://zerodayinitiative.com/advisories/ZDI-16-241/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.