Heap-based buffer overflow in quicktime.qts in CoreMedia and QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a malformed .3g2 movie file with H.263 encoding that triggers an incorrect buffer length calculation.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6626 | signature vdb entry |
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html | patch vendor advisory |
http://www.zerodayinitiative.com/advisories/ZDI-10-036 | |
http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html | vendor advisory |
http://support.apple.com/kb/HT4077 | patch vendor advisory |
http://www.securityfocus.com/archive/1/510510/100/0/threaded | mailing list |