Multiple Vulnerabilities in Apple QuickTime Could Allow Arbitrary Code Execution

ITS Advisory Number: 
2016-002
Date(s) Issued: 
Friday, January 8, 2016
Subject: 
Multiple Vulnerabilities in Apple QuickTime Could Allow Arbitrary Code Execution
Overview: 

Multiple vulnerabilities have been discovered in Apple QuickTime, which could allow an attacker to potentially execute arbitrary code. QuickTime is a multimedia application that is capable of playing video, sound, and image files. These vulnerabilities can be exploited if a user opens a specially crafted file, including an email attachment. Successful exploitation could result in unexpected application crashes and arbitrary code execution within the context of the application. Depending on the privileges associated with the application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Systems Affected: 
  • Apple QuickTime 7 prior to 7.7.9 for Microsoft Windows 7 and Windows Vista

RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Multiple memory-corruption vulnerabilities have been discovered in Apple QuickTime 7 that could allow for arbitrary code execution. These vulnerabilities can be exploited if a user opens a specially crafted movie file, including an email attachment. The memory corruption issues were addressed through improved memory handling in QuickTime 7.7.9. (CVE-2015-7085, CVE-2015-7086,  CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7091, CVE-2015-7092, CVE-2015-7117)

Successful exploitation could result in unexpected application crashes and arbitrary code execution within the context of the application. Depending on the privileges associated with the application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. 

Actions: 
  • Apply appropriate updates provided by Apple to vulnerable systems immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to download, accept, or execute files from un-trusted or unknown sources.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.