Vulnerability Name:

CVE-2010-3801 (CCN-63735)

Assigned:2010-12-07
Published:2010-12-07
Updated:2017-09-19
Summary:Apple QuickTime before 7.6.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted FlashPix file.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-3801

Source: APPLE
Type: Patch, Vendor Advisory
APPLE-SA-2010-12-07-1

Source: APPLE
Type: UNKNOWN
APPLE-SA-2011-03-21-1

Source: OSVDB
Type: UNKNOWN
69755

Source: CCN
Type: SECTRACK ID: 1024830
Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

Source: CCN
Type: Apple Web site
About the security content of QuickTime 7.6.9

Source: CONFIRM
Type: Vendor Advisory
http://support.apple.com/kb/HT4447

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT4581

Source: CCN
Type: OSVDB ID: 69755
Apple QuickTime Crafted FlashPix File Handling Memory Corruption

Source: CCN
Type: BID-45240
Apple QuickTime FlashPix Image (CVE-2010-3801) Memory Corruption Remote Code Execution Vulnerability

Source: SECTRACK
Type: UNKNOWN
1024830

Source: MISC
Type: UNKNOWN
http://zerodayinitiative.com/advisories/ZDI-10-259/

Source: XF
Type: UNKNOWN
quicktime-flashpix-file-code-exec(63735)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:15642

Source: CCN
Type: ZDI-10-259
Apple QuickTime FPX Subimage Count Out-of-bounds Counter Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:quicktime:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:*:*:*:*:*:*:*:* (Version <= 7.6.8)

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x_server:10.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:apple:quicktime:7.6.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:15642
    V
    Vulnerability in Apple QuickTime before 7.6.9 via a crafted FlashPix file
    2013-07-29
    BACK
    apple quicktime 3.0
    apple quicktime 4.1.2
    apple quicktime 5.0
    apple quicktime 5.0.1
    apple quicktime 5.0.2
    apple quicktime 6.0
    apple quicktime 6.0.0
    apple quicktime 6.0.1
    apple quicktime 6.0.2
    apple quicktime 6.1
    apple quicktime 6.1.0
    apple quicktime 6.1.1
    apple quicktime 6.2.0
    apple quicktime 6.3.0
    apple quicktime 6.4.0
    apple quicktime 6.5
    apple quicktime 6.5.0
    apple quicktime 6.5.1
    apple quicktime 6.5.2
    apple quicktime 7.0
    apple quicktime 7.0.0
    apple quicktime 7.0.1
    apple quicktime 7.0.2
    apple quicktime 7.0.3
    apple quicktime 7.0.4
    apple quicktime 7.1
    apple quicktime 7.1.0
    apple quicktime 7.1.1
    apple quicktime 7.1.2
    apple quicktime 7.1.3
    apple quicktime 7.1.4
    apple quicktime 7.1.5
    apple quicktime 7.1.6
    apple quicktime 7.2
    apple quicktime 7.2.1
    apple quicktime 7.3
    apple quicktime 7.3.0
    apple quicktime 7.3.1
    apple quicktime 7.3.1.70
    apple quicktime 7.4
    apple quicktime 7.4.0
    apple quicktime 7.4.1
    apple quicktime 7.4.5
    apple quicktime 7.5.0
    apple quicktime 7.5.5
    apple quicktime 7.6.0
    apple quicktime 7.6.1
    apple quicktime 7.6.2
    apple quicktime 7.6.5
    apple quicktime 7.6.6
    apple quicktime 7.6.7
    apple quicktime *
    apple mac os x server 10.6
    apple mac os x 10.6
    apple mac os x server 10.6.1
    apple mac os x 10.6.1
    apple mac os x server 10.6.2
    apple mac os x 10.6.2
    apple mac os x 10.6.3
    apple mac os x server 10.6.3
    apple mac os x server 10.6.4
    apple mac os x 10.6.4
    apple quicktime 7.6.6
    apple quicktime 7.6.8
    apple mac os x server 10.6.5
    apple mac os x 10.6.5
    apple mac os x server 10.6.6
    apple mac os x 10.6.6
    apple mac os x 10.5.8
    apple mac os x server 10.5.8