CVE-2008-3626
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
11/09/2008
Last modified:
09/04/2025
Description
The CallComponentFunctionWithStorage function in Apple QuickTime before 7.5.5 does not properly handle a large entry in the sample_size_table in STSZ atoms, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:* | 7.4.5 (including) | |
| cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html
- http://marc.info/?l=bugtraq&m=122099929821288&w=2
- http://secunia.com/advisories/31821
- http://secunia.com/advisories/32121
- http://securitytracker.com/id?1020841=
- http://support.apple.com/kb/HT3027
- http://support.apple.com/kb/HT3189
- http://www.securityfocus.com/bid/31086
- http://www.securityfocus.com/bid/31546
- http://www.vupen.com/english/advisories/2008/2527
- http://www.vupen.com/english/advisories/2008/2735
- http://www.zerodayinitiative.com/advisories/ZDI-08-059/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16152
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html
- http://marc.info/?l=bugtraq&m=122099929821288&w=2
- http://secunia.com/advisories/31821
- http://secunia.com/advisories/32121
- http://securitytracker.com/id?1020841=
- http://support.apple.com/kb/HT3027
- http://support.apple.com/kb/HT3189
- http://www.securityfocus.com/bid/31086
- http://www.securityfocus.com/bid/31546
- http://www.vupen.com/english/advisories/2008/2527
- http://www.vupen.com/english/advisories/2008/2735
- http://www.zerodayinitiative.com/advisories/ZDI-08-059/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16152



