Fortinet Discovers Apple QuickTime 3gp File 'stsz' Atom Handling Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Apple QuickTime.
QuickTime is an extensible multimedia framework developed by Apple Inc., capable of handling various formats of digital video, picture, sound, panoramic images and interactivity. The classic version of QuickTime is available for Windows XP and later, as well as Mac OS X Leopard and later operating systems.
This vulnerability is caused due to insufficient validation of the value of 'sample_size' field in 'stsz' atom when parsing 3gp file. It may lead to an unexpected application termination or arbitrary code execution.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Aug 19, 2015
Users should apply the solution provided by Apple.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.