Vulnerability Name:

CVE-2009-0002 (CCN-48155)

Assigned:2008-12-15
Published:2009-01-21
Updated:2018-10-30
Summary:Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a QTVR movie file with crafted THKD atoms.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: BUGTRAQ
Type: UNKNOWN
20090121 ZDI-09-005: Apple QuickTime VR Track Header Atom Heap Corruption Vulnerability

Source: MITRE
Type: CNA
CVE-2009-0002

Source: APPLE
Type: Patch, Vendor Advisory
APPLE-SA-2009-01-21

Source: OSVDB
Type: UNKNOWN
51525

Source: CCN
Type: SA33632
Apple QuickTime Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
33632

Source: CCN
Type: SECTRACK ID: 1021623
QuickTime Heap Overflow in Processing QTVR Files Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: Apple Web site
About the security content of QuickTime 7.6

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3403

Source: CCN
Type: OSVDB ID: 51525
Apple QuickTime Crafted THKD Atom QTVR File Handling Overflow

Source: BID
Type: UNKNOWN
33384

Source: CCN
Type: BID-33384
Apple QuickTime QTVR Movie Remote Buffer Overflow Vulnerability

Source: CERT
Type: US Government Resource
TA09-022A

Source: VUPEN
Type: UNKNOWN
ADV-2009-0212

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-09-005/

Source: XF
Type: UNKNOWN
quicktime-thkd-bo(48155)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5646

Source: CCN
Type: ZDI-09-005
Apple QuickTime VR Track Header Atom Heap Corruption Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:quicktime:-:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:*:*:*:*:*:*:*:* (Version <= 7.5.5)
  • AND
  • cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.5.5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5646
    V
    Apple QuickTime QTVR Heap Based buffer overflow vulnerability
    2014-02-03
    BACK
    apple quicktime -
    apple quicktime 3.0
    apple quicktime 4.1.2
    apple quicktime 5.0
    apple quicktime 5.0.1
    apple quicktime 5.0.2
    apple quicktime 6.0
    apple quicktime 6.1
    apple quicktime 6.5
    apple quicktime 6.5.1
    apple quicktime 6.5.2
    apple quicktime 7.0
    apple quicktime 7.0.1
    apple quicktime 7.0.2
    apple quicktime 7.0.3
    apple quicktime 7.0.4
    apple quicktime 7.1
    apple quicktime 7.1.1
    apple quicktime 7.1.2
    apple quicktime 7.1.3
    apple quicktime 7.1.4
    apple quicktime 7.1.5
    apple quicktime 7.1.6
    apple quicktime 7.2
    apple quicktime 7.3
    apple quicktime 7.3.1
    apple quicktime 7.3.1.70
    apple quicktime 7.4
    apple quicktime 7.4.1
    apple quicktime 7.4.4
    apple quicktime 7.4.5
    apple quicktime 7.5
    apple quicktime *
    apple mac os x 10.4.9
    apple mac os x 10.5
    apple mac os x 10.5.1
    apple mac os x 10.5.2
    apple mac os x 10.5.3
    apple mac os x 10.5.4
    apple mac os x 10.5.5
    microsoft windows vista *
    microsoft windows xp * sp2
    microsoft windows xp * sp3
    apple quicktime 7.0.1
    apple quicktime 7.0.3
    apple quicktime 7.1.3
    apple quicktime 7.2
    apple quicktime 7.3
    apple quicktime 7.0
    apple quicktime 7.0.2
    apple quicktime 7.0.4
    apple quicktime 7.1
    apple quicktime 7.1.1
    apple quicktime 7.1.2
    apple quicktime 7.1.4
    apple quicktime 7.1.5
    apple quicktime 7.1.6
    apple quicktime 7.3.1
    apple quicktime 7.4
    apple quicktime 7.4.5
    apple quicktime 7.4.1
    apple quicktime 7.5
    apple quicktime 7.5.5
    microsoft windows xp sp2
    microsoft windows vista *
    apple mac os x 10.4.9
    apple mac os x 10.4.10
    apple mac os x 10.5
    apple mac os x 10.4.11
    microsoft windows xp sp3