lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 04 Nov 2005 05:24:31 +0100
From: Piotr Bania <>
Subject: Advisory: Apple QuickTime Player Remote Integer
	Overflow (1)

Apple QuickTime Player Remote Integer Overflow (1)
by Piotr Bania <>
All rights reserved.

CVE-ID: 		CVE-2005-2753

Original location:

Severity: 		Critical - remote code execution.

Software affected:	QuickTime package 7.0.1 for Mac OS X 10.3
			QuickTime package 7.0.1 for Mac OS X 10.4
			QuickTime package 6.5.2 for Mac OS X 10.3
			QuickTime package 6.5.2 for Mac OS X 10.2
			QuickTime package 7* for Windows

			Older versions may be also vulnerable.
Note:			Following versions are not vulnerable, due to
			the fact I have reported the vulnerabilities
			before their releases:

			QuickTime package 7.0.2 for Mac OS X 10.3
			QuickTime package 7.0.2 for Mac OS X 10.4


Author takes no responsibility for any actions with provided
informations or codes. The copyright for any material created by the
author is reserved. Any duplication of codes or texts provided here in
electronic or printed publications is not permitted without the author's


Apple QuickTime Player is one of the Apple QuickTime components
used by hundreds of millions of users.


Apple QuickTime Player is reported prone to remote integer overflow
vulnerability (exploitable via remotely originated content).

A sign extension of an embedded "Pascal" style string could result in
a very large memory copy, which lead to potencial memory overwrite.

The vulnerability may lead to remote code execution when specially
crafted video file (MOV file) is being loaded.


Due to severity of this bug i will not release any proof of concept
codes for this issue.


Vendor (Apple) has been noticed and released all necessary patches.

best regards,
Piotr Bania

Piotr Bania - <> - 0xCD, 0x19
Fingerprint: 413E 51C7 912E 3D4E A62A  BFA4 1FF6 689F BE43 AC33  - Key ID: 0xBE43AC33

                           " Dinanzi a me non fuor cose create
                             se non etterne, e io etterno duro.
                             Lasciate ogne speranza, voi ch'intrate "
                                           - Dante, Inferno Canto III

Powered by blists - more mailing lists