Vulnerability Name:

CVE-2007-4675 (CCN-38282)

Assigned:2007-11-05
Published:2007-11-05
Updated:2018-10-26
Summary:Heap-based buffer overflow in the QuickTime VR extension 7.2.0.240 in QuickTime.qts in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via a QTVR (QuickTime Virtual Reality) movie file containing a large size field in the atom header of a panorama sample atom.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Sat Nov 10 2007 - 07:41:32 CST
[48Bits Advisory] QuickTime Panorama Sample Atom Heap Overflow

Source: MISC
Type: Third Party Advisory
http://blog.48bits.com/?p=176

Source: MITRE
Type: CNA
CVE-2007-4675

Source: CCN
Type: Apple Web site
About the security content of QuickTime 7.3

Source: CONFIRM
Type: Vendor Advisory
http://docs.info.apple.com/article.html?artnum=306896

Source: IDEFENSE
Type: Broken Link
20071105 Apple QuickTime Panorama Sample Atom Heap Buffer Overflow Vulnerability

Source: APPLE
Type: Patch, Vendor Advisory
APPLE-SA-2007-11-05

Source: CCN
Type: SA27523
Apple QuickTime Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
27523

Source: CCN
Type: SECTRACK ID: 1018894
QuickTime Movie/PICT/QTVR/Java Bugs Let Remote Users Execute Arbitrary Code

Source: CCN
Type: 48Bits Advisory
QuickTime Panorama Sample Atom Heap Overflow

Source: MISC
Type: Third Party Advisory
http://www.48bits.com/advisories/qt_pdat_heapbof.pdf

Source: CCN
Type: Apple QuickTime Web site
Apple - QuickTime

Source: OSVDB
Type: Broken Link
38545

Source: CCN
Type: OSVDB ID: 38545
Apple QuickTime VR Extension QTVR Movie Handling Overflow

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20071110 [48Bits Advisory] QuickTime Panorama Sample Atom Heap Overflow

Source: BID
Type: Third Party Advisory, VDB Entry
26342

Source: CCN
Type: BID-26342
Apple QuickTime Panorama Sample Atoms Remote Heap Buffer Overflow Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1018894

Source: CERT
Type: Third Party Advisory, US Government Resource
TA07-310A

Source: VUPEN
Type: Third Party Advisory
ADV-2007-3723

Source: XF
Type: Third Party Advisory, VDB Entry
quicktime-qtvr-bo(38282)

Source: XF
Type: UNKNOWN
quicktime-qtvr-bo(38282)

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 11.05.07
Apple QuickTime Panorama Sample Atom Heap Buffer Overflow Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:quicktime:*:*:*:*:*:*:*:* (Version < 7.3)
  • AND
  • cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apple:quicktime:7.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple quicktime *
    apple mac os x 10.3.9
    apple mac os x 10.4.10
    apple mac os x 10.5
    microsoft windows vista -
    microsoft windows xp * sp2
    apple quicktime 7.2
    microsoft windows xp sp2
    apple mac os x 10.3.9
    microsoft windows vista *
    apple mac os x 10.4.9
    apple mac os x 10.5