Apple QuickTime < 7.7.8 Multiple Arbitrary Code Vulnerabilities (Windows)

High Nessus Plugin ID 85662

Synopsis

The remote Windows host contains an application that is affected by multiple arbitrary code execution vulnerabilities.

Description

The version of Apple QuickTime installed on the remote Windows host is prior to 7.7.8. It is, therefore, affected by multiple arbitrary code execution vulnerabilities :

- A memory corruption issue exists due to improper validation of user-supplied input when handling URL atom sizes. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-3788)

- A memory corruption issue exists due to improper validation of user-supplied input when handling 3GPP STSD sample description entry sizes. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user.
(CVE-2015-3789)

- A memory corruption issue exists due to improper validation of user-supplied input when handling MVHD atom sizes. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-3790)

- A memory corruption issue exists due to improper validation of user-supplied input when handling mismatching ESDS atom descriptor type lengths. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-3791)

- A memory corruption issue exists due to improper validation of user-supplied input when handling MDAT sections. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-3792)

- An unspecified memory corruption issue exists due to improper validation of user-supplied input. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-5751)

- An unspecified memory corruption issue exists due to improper validation of user-supplied input. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-5779)

- An unspecified memory corruption issue exists due to improper validation of user-supplied input. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-5785)

- An unspecified memory corruption issue exists due to improper validation of user-supplied input. A remote attacker can exploit this issue by convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-5786)

Solution

Upgrade to Apple QuickTime 7.7.8 or later.

See Also

https://support.apple.com/en-us/HT205046

Plugin Details

Severity: High

ID: 85662

File Name: quicktime_778.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 2015/08/27

Updated: 2018/07/25

Dependencies: 21561

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:quicktime

Required KB Items: SMB/QuickTime/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/08/18

Vulnerability Publication Date: 2015/08/18

Reference Information

CVE: CVE-2015-3788, CVE-2015-3789, CVE-2015-3790, CVE-2015-3791, CVE-2015-3792, CVE-2015-5751, CVE-2015-5779, CVE-2015-5785, CVE-2015-5786

BID: 76340, 76443, 76444

APPLE-SA: APPLE-SA-2015-08-20-1