Rapid7 Vulnerability & Exploit Database

QuickTime: heap corruption allows arbitrary code execution via malicious movie files with modified Macintosh resource records (CVE-2008-0032)

Back to Search

QuickTime: heap corruption allows arbitrary code execution via malicious movie files with modified Macintosh resource records (CVE-2008-0032)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
01/15/2008
Created
07/25/2018
Added
10/25/2010
Modified
02/13/2015

Description

A memory corruption issue exists in QuickTime's handling of Macintosh Resource records in movie files. Opening a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of movie files. Credit to Jun Mao of VeriSign iDefense Labs for reporting this issue.

Solution(s)

  • quicktime-upgrade-7_4_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;