Vulnerability Name:

CVE-2008-0234 (CCN-39601)

Assigned:2008-01-10
Published:2008-01-10
Updated:2018-10-15
Summary:Buffer overflow in Apple Quicktime Player 7.3.1.70 and other versions before 7.4.1, when RTSP tunneling is enabled, allows remote attackers to execute arbitrary code via a long Reason-Phrase response to an rtsp:// request, as demonstrated using a 404 error message.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Luigi Auriemma Advisories, 10 Jan 2008
Buffer-overflow in Quicktime Player 7.3.1.70

Source: CCN
Type: BugTraq Mailing List, Thu Jan 10 2008 - 15:39:10 CST
Re: Buffer-overflow in Quicktime Player 7.3.1.70

Source: MITRE
Type: CNA
CVE-2008-0234

Source: CCN
Type: Apple Web site
About the security content of QuickTime 7.4.1

Source: APPLE
Type: Patch, Vendor Advisory
APPLE-SA-2008-07-10

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-02-06

Source: CCN
Type: SA28423
Apple QuickTime RTSP Reply Reason-Phrase Buffer Overflow

Source: SECUNIA
Type: Vendor Advisory
28423

Source: CCN
Type: SA31034
Apple TV Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
31034

Source: SREASON
Type: Exploit
3537

Source: CCN
Type: SECTRACK ID: 1019178
QuickTime Buffer Overflow in Processing HTTP 404 Response Messages Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: Apple QuickTime Web site
Apple - QuickTime

Source: CCN
Type: US-CERT VU#112179
Apple QuickTime RTSP Response message Reason-Phrase buffer overflow vulnerability

Source: CERT-VN
Type: US Government Resource
VU#112179

Source: CCN
Type: OSVDB ID: 40382
Apple QuickTime RTSP Response Long Reason-Phrase Arbitrary Remote Code Execution

Source: BUGTRAQ
Type: UNKNOWN
20080110 Buffer-overflow in Quicktime Player 7.3.1.70

Source: BUGTRAQ
Type: UNKNOWN
20080110 Re: Buffer-overflow in Quicktime Player 7.3.1.70

Source: BUGTRAQ
Type: UNKNOWN
20080111 Re: Re: Buffer-overflow in Quicktime Player 7.3.1.70

Source: BUGTRAQ
Type: UNKNOWN
20080111 Re: Buffer-overflow in Quicktime Player 7.3.1.70

Source: BUGTRAQ
Type: UNKNOWN
20080114 Re: [Full-disclosure] Buffer-overflow in Quicktime Player 7.3.1.70

Source: BUGTRAQ
Type: UNKNOWN
20080112 Re: Re: Buffer-overflow in Quicktime Player 7.3.1.70

Source: BUGTRAQ
Type: UNKNOWN
20080112 Re: Buffer-overflow in Quicktime Player 7.3.1.70

Source: BID
Type: Exploit
27225

Source: CCN
Type: BID-27225
Apple QuickTime RTSP Response Reason-Phrase Remote Buffer Overflow Vulnerability

Source: SECTRACK
Type: UNKNOWN
1019178

Source: VUPEN
Type: Vendor Advisory
ADV-2008-0107

Source: VUPEN
Type: Vendor Advisory
ADV-2008-2064

Source: XF
Type: UNKNOWN
quicktime-rtsp-responses-bo(39601)

Source: XF
Type: UNKNOWN
quicktime-rtsp-responses-bo(39601)

Source: EXPLOIT-DB
Type: UNKNOWN
4885

Source: EXPLOIT-DB
Type: UNKNOWN
4906

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple quicktime 7.3.1.70
    apple quicktime 7.4
    apple quicktime 7.0.1
    apple quicktime 7.0.3
    apple quicktime 7.1.3
    apple quicktime 7.2
    apple quicktime 7.3
    apple quicktime 7.0
    apple quicktime 7.0.2
    apple quicktime 7.0.4
    apple quicktime 7.1
    apple quicktime 7.1.1
    apple quicktime 7.1.2
    apple quicktime 7.1.4
    apple quicktime 7.1.5
    apple quicktime 7.1.6
    apple quicktime 7.3.1
    apple quicktime 7.3.1.70