Advisory Details

June 11th, 2013

Apple QuickTime MJPEG Frame stsd Atom Heap Overflow Remote Code Execution Vulnerability

ZDI-13-114
ZDI-CAN-1720

CVE ID CVE-2013-1020
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Apple
AFFECTED PRODUCTS QuickTime
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within processing a mjpeg movie with an improper jpeg frame size via the stsd atom. When processing the movie, the size of the destination buffer for jpeg contents is specified separately from the JPEG size. This can lead to memory corruption that can be leveraged to achieve code execution under the context of the process.

ADDITIONAL DETAILS Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT1222
DISCLOSURE TIMELINE
  • 2013-02-04 - Vulnerability reported to vendor
  • 2013-06-11 - Coordinated public release of advisory
CREDIT Tom Gallagher (Microsoft) & Paul Bates (Microsoft)
BACK TO ADVISORIES