30 lines
No EOL
1.1 KiB
Text
30 lines
No EOL
1.1 KiB
Text
*Application : Apple QuickTime
|
|
Versions : <= before 7.7.3
|
|
CVE : 2012-3755*
|
|
*Impact : 9.3 (High)*
|
|
*References* *:* *
|
|
http://lists.apple.com/archives/security-announce/2012/Nov/msg00002.html*
|
|
*Auther : Senator of Pirates*
|
|
*E-Mail : SenatorofPirates.team[at]gmail.com
|
|
FaceBook : /SenatorofPirates
|
|
**/SenatorofPiratesInfo
|
|
Greetz : To Morocco
|
|
|
|
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
*
|
|
|
|
*Vulnerability :
|
|
|
|
A buffer overflow vulnerability in QuickTime PictureViewer.exe and the
|
|
specific flaw exists within TGA file images encoded data, When encountering
|
|
an invalid encoded width field and can be result a heap-based buffer
|
|
overflow occur.
|
|
And this vulnerability allows remote attackers to execute arbitrary code or
|
|
cause a denial of service (application crash) via a crafted Targa image. *
|
|
*
|
|
PoC :
|
|
|
|
http://www18.zippyshare.com/v/40547915/file.html
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22855.tga
|
|
|
|
* |