|
Home : Advisories : Apple Quick Time Plug-in Buffer Overflow
Title: |
Apple Quick Time Plug-in Buffer Overflow |
Released by: |
Shadow Penguin Security |
Date: |
31st January 2001 |
Printable version: |
Click here |
SPS Advisory #41
Apple Quick Time Plug-in Buffer Overflow
UNYUN
Shadow Penguin Security (http://shadowpenguin.backsection.net)
--------------------------------------------------------------
[Date]
July 31, 2001
[Vulnerable]
QuickTime Player 4.1.2 for Windows (Japanese)
[Not vulnerable]
unknown
[Overview]
There is a exploitable buffer overflow bug in quick time plug-in
for windows. This problem occurs when the visitor clicks the shown
movie in the browser. Quick time plug-in doesn't check the length of
HREF parameter in EMBED tag appropriately, Quick time overflows when
the long string is specified in HREF. This buffer overflow overwrites
the local buffer, the codes which are written in the EMBED tag can be
executed in the client host.
[Risk]
If the HTML file which contains the cracking code in EMBED tag is
opened and visitor clicks the shown movie, the cracking code will be
executed on the client host. This overflow contains the possibility of
the virus and trojans infection, sytsem destruction, intrusion, and
so on.
[Details]
We explain the details of this problem under the environment of
Windows98(SE/Japanes)+QuickTime Player 4.1.2 for Windows+Internet
Explorer 5.0. You can check this problem easily by the following
simple HTML file.
|