Quick Time update and WinAMP MP4 exploit

Started by DAB Badboy, May 02, 2007, 07:03:48

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

DAB Badboy


Winamp 0-day
Published: 2007-05-02,
Last Updated: 2007-05-02 02:26:45 UTC
by Chris Carboni (Version: 1)
A remote code execution vulnerability and exploit for Winamp 5.34 has been released.

The vulnerability exists within Winamp's MP4 decoding.  Successful exploitation will allow an attacker to execute arbitrary code under the context of the logged in user.

After install Winamp is associated with .MP4 files. However, Winamp does not open .MP4 files embedded within websites. This forces would-be attackers to deliver the .MP4 directly to the user's host. E-mail or a website link that would require the download of the .MP4 file in order to play are the most likely exploit vectors.

Removal of the association of .MP4 files to Winamp will mitigate this vulnerability until a vendor supplied patch is available.

-Chris
Quicktime patches up to 7.1.6
Published: 2007-05-02,
Last Updated: 2007-05-02 01:07:22 UTC
by Joel Esler (Version: 1)
Thanks all for writing in, we've been patching ourselves.

Quicktime's update for the vulnerability discovered at CanSecWest came out today.  Yes, this is the now-infamous Java/Quicktime/Browser vulnerability that Dino Dai Zovi discovered during the "pwn-2-own" contest, that TippingPoint bought for 10,000 dollars for their Zero-Day initiative.  This was initially covered by Deb Hale back in this diary.

If you have been following the blog over at Matasano Chargen where Thomas Ptacek has been doing a great job covering it on the Matasano blog: http://www.matasano.com/log/
(This is one of those blogs that you should put in your rss reader if you have one)

Apple's writeup on this says:

    *

      QuickTime

      CVE-ID: CVE-2007-2175

      Available for: Mac OS X v10.3.9, Mac OS X v10.4.9, Windows XP SP2, Windows 2000 SP4

      Impact: Visiting a malicious website may lead to arbitrary code execution

      Description: An implementation issue exists in QuickTime for Java, which may allow reading or writing out of the bounds of the allocated heap. By enticing a user to visit a web page containing a maliciously-crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution. This update addresses the issue by performing additional bounds checking when creating QTPointerRef objects. Credit to Dino Dai Zovi working with TippingPoint and the Zero Day Initiative for reporting this issue.


Time to update!  12 days to put out an update for Apple.  Not too bad.
(Yes, I am an Apple Fanboy)

Joel Esler
http://handlers.sans.org/jesler

http://isc.sans.org/


Rik

Thanks for posting that. Gone to patch...
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.