Vulnerability Name:

CVE-2007-4676 (CCN-38281)

Assigned:2007-11-05
Published:2007-11-05
Updated:2018-10-26
Summary:Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via malformed elements when parsing (1) Poly type (0x0070 through 0x0074) and (2) PackBitsRgn field (0x0099) opcodes in a PICT image.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-4676

Source: CCN
Type: Apple Web site
About the security content of QuickTime 7.3

Source: CONFIRM
Type: Vendor Advisory
http://docs.info.apple.com/article.html?artnum=306896

Source: APPLE
Type: Vendor Advisory
APPLE-SA-2007-11-05

Source: OSVDB
Type: Broken Link
38546

Source: CCN
Type: SA27523
Apple QuickTime Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
27523

Source: SREASON
Type: Third Party Advisory
3351

Source: CCN
Type: SECTRACK ID: 1018894
QuickTime Movie/PICT/QTVR/Java Bugs Let Remote Users Execute Arbitrary Code

Source: CCN
Type: Apple QuickTime Web site
Apple - QuickTime

Source: CCN
Type: US-CERT VU#690515
Apple QuickTime buffer overflow vulnerability

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#690515

Source: CCN
Type: OSVDB ID: 38546
Apple QuickTime PICT Image Handling Multiple Element Parsing Overflow

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20071105 ZDI-07-066: Apple Quicktime PICT File PackBitsRgn Parsing Heap Corruption Vulnerability

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20071105 ZDI-07-067: Apple QuickTime PICT File Poly Opcodes Heap Corruption Vulnerability

Source: BID
Type: Third Party Advisory, VDB Entry
26345

Source: CCN
Type: BID-26345
Apple QuickTime PICT Image Remote Multiple Heap Buffer Overflow Vulnerabilities

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1018894

Source: CERT
Type: Third Party Advisory, US Government Resource
TA07-310A

Source: VUPEN
Type: Third Party Advisory
ADV-2007-3723

Source: MISC
Type: Third Party Advisory, VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-07-066.html

Source: MISC
Type: Third Party Advisory, VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-07-067.html

Source: XF
Type: Third Party Advisory, VDB Entry
quicktime-packbitsrgn-bo(38280)

Source: XF
Type: Third Party Advisory, VDB Entry
quicktime-poly-type-bo(38281)

Source: XF
Type: UNKNOWN
quicktime-poly-type-bo(38281)

Source: CCN
Type: ZDI-07-067
Apple QuickTime PICT File Poly Opcodes Heap Corruption Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:quicktime:*:*:*:*:*:*:*:* (Version < 7.3)
  • AND
  • cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apple:quicktime:7.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple quicktime *
    apple mac os x 10.3.9
    apple mac os x 10.4.10
    apple mac os x 10.5
    microsoft windows vista -
    microsoft windows xp - sp2
    apple quicktime 7.2
    microsoft windows xp sp2
    apple mac os x 10.3.9
    microsoft windows vista *
    apple mac os x 10.4.9
    apple mac os x 10.5