MoAB #1: Apple Quicktime RTSP URL Handling Buffer Overflow Vulnerability

LMH’s “Month of Apple Bugs” has begun:

“‘LMH’ has discovered a vulnerability in Apple Quicktime, which can be exploited by malicious people to compromise a user’s system,” Secunia reports.

“The vulnerability is caused due to a boundary error when handling RTSP URLs. This can be exploited to cause a stack-based buffer overflow via a specially crafted QTL file with an overly long (more than 256 bytes) ‘src’ parameter (e.g. ‘rtsp://[any character]:[>256 bytes]’),” Secunia reports. “Successful exploitation allows execution of arbitrary code. The vulnerability is confirmed in version 7.1.3.100 (Windows version) and reportedly affects both Microsoft Windows and Mac OS X versions.”

Secunia reports, “Solution: Do not open untrusted QTL files.”

More info here.

“This issue has been successfully exploited in QuickTime™ Version 7.1.3, Player Version 7.1.3. Previous versions should be vulnerable as well. Both Microsoft Windows and Mac OS X versions are affected,” LMH reports.

Full article here.

55 Comments

  1. “The vulnerability is confirmed in version 7.1.3.100 (Windows version) and reportedly affects both Microsoft Windows and Mac OS X versions.” (my emphasis)

    So it MIGHT be a Windows issue or a QuickTime issue (could be due to how QuickTime interacts with Windows or an issue of QuickTime itself). It MIGHT be cross platform; it might not be.

    Great way to nail down the specifics of the issue! NOT!

    I just love all these people claiming, “Successful exploitation allows execution of arbitrary code.” Just because you can get the process(or) to look at the data as code, does not mean it can be an exploiting piece of code. There are lots of restrictions in the OS and QT as to what code can and cannot do even when it runs.

    It would be much more interesting if the people putting forth this “exploit” were to say that they had been able to run code that actually <b>DID/b> something rather than the old saw about being able to run “arbitrary code”. Until someone has shown — even in a lab environment — that truly malicious code can be run to effect some nefarious action then I call this one a non issue.

    Should Apple fix it? YES.
    Is it a non issue at this point? YES

  2. hey i thought i was the only one with similar feelings. i’m running a mac pro, used to have a power mac dual. i dunno, OS X and the finder feels better. hard to describe, but everything feels better and more refined on the ppc. same amount of ram too, 3 gigs

  3. This can be exploited to cause a stack-based buffer overflow via a specially crafted QTL file with an overly long (more than 256 bytes) ‘src’ parameter (e.g. ‘rtsp://[any character]:[>256 bytes]’),

    And how many normal users have this special QTL file?

    Answer 1

    Non-issue in my opinion. Which means the bugs still stand at zero.

    Next?

  4. All this talk about Intel processors leads me to question whether the vulnerability is limited to them. Is QuickTime on PPC computers not affected?

    I know QT is QuickTime, but what does the L mean in QTL? I found RTSP at the acronym finder site, but not QTL.

  5. Remember “bug” and “security risk” are two separate things. There are many many bugs in OSX.

    By the way, bug.squisher, it’d probably help if you set up the mime settings on that server so that it treats .qtl files as something other than text. Just trying to help ” width=”19″ height=”19″ alt=”smile” style=”border:0;” />

  6. By the way, if anyone hasn’t figured it out, bug.squisher’s post was an attempt at being harmful. So, I would suggest you NOT click on links within any comment linked to these types of stories for the month.

    Unless you know what you’re doing.

  7. bug.squisher,

    At least change it so that it says something like “bug.squisher’s in da houz” to REALLY prove how “mad” your “skillz” are.

    From their FAQ
    “And the reward (automated responses and euphemism-heavy advisories) doesn’t pay off in the end.”

    So what I posted before applies. Because Apple doesn’t kneel and pay homage to their self described “trivial” fixes, they got bent about it. ” width=”19″ height=”19″ alt=”smile” style=”border:0;” /> These are the kids who’s mother did everything for them as children and are upset because good ol’ mom doesn’t have as much pull with Apple as she had with the school board.

  8. You’d think that they would start with a good one.

    This first bug appears to be hard to make work on Macs. If the remaining bugs are of this calibre, nobody will be listening when they talk about the final one on Jan 31st.

    I would have expected them to start with a flourish, get people paying attention, then slip a few marginal ones in the middle and end with a big bang. I’m not sure that this first bug is even a fizzle.

  9. If the goal is to prove the Mac is as vulnerable as Windows, I think they are going to need more than 30 days to do it. Seems to me they will need to string together about 114,000 days of bugs, just to get close.

    That works out to about 312 years.

    Good luck, LMH

  10. Crashing an app IS a success, which is why if it happens during the normal course of using an application, companies usually put that at a higher priority than things that simply “don’t work right”.

    MW Magic Phrase:
    We’ll see what they have for us in the “morning”.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.