Rapid7 VulnDB

Apple Quicktime 7 Invalid Atom Length Buffer Overflow

Back to Search

Apple Quicktime 7 Invalid Atom Length Buffer Overflow

Disclosed
05/22/2013
Created
05/30/2018

Description

This module exploits a vulnerability found in Apple QuickTime. The flaw is triggered when QuickTime fails to properly handle the data length for certain atoms such as 'rdrf' or 'dref' in the Alis record, which may result a buffer overflow by loading a specially crafted .mov file, and allows arbitrary code execution under the context of the current user. Please note: Since an egghunter is used to search for the payload, this may require additional time for the exploit to complete.

Author(s)

  • Jason Kratzer
  • Tom Gallagher
  • Paul Bates
  • sinn3r <sinn3r@metasploit.com>

Platform

Windows

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/fileformat/apple_quicktime_rdrf
msf exploit(apple_quicktime_rdrf) > show targets
    ...targets...
msf exploit(apple_quicktime_rdrf) > set TARGET < target-id >
msf exploit(apple_quicktime_rdrf) > show options
    ...show and set options...
msf exploit(apple_quicktime_rdrf) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;