TippingPoint Zero Day Initiative

Apple Quicktime PNG Depth Decoding Remote Code Execution Vulnerability

ZDI-12-058: April 9th, 2012


CVSS Score

Affected Vendors

Affected Products

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AppleQuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw occurs when the application allocates space for decoding a video sample encoded with the .png format. When calculating space for this surface, the application will explicitly trust the bit-depth within the MediaVideo header. During the decoding process, the application will write outside the surface's boundaries. This can be leveraged to allow for one to earn code execution under the context of the application.

Vendor Response

Apple has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2011-10-21 - Vulnerability reported to vendor
    2012-04-09 - Coordinated public release of advisory


This vulnerability was discovered by:
    Luigi Auriemma