SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Multimedia)  >   QuickTime/Darwin Streaming Server Vendors:   Apple Computer
Darwin Streaming Server RTSP Buffer Overflows Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1018047
SecurityTracker URL:  http://securitytracker.com/id/1018047
CVE Reference:   CVE-2007-0748, CVE-2007-0749   (Links to External Site)
Date:  May 11 2007
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 5.5.5
Description:   Two vulnerabilities were reported in Darwin Streaming Server. A remote user can execute arbitrary code on the target system.

A remote user can send a specially crafted RTSP request to trigger one of two buffer overflows and execute arbitrary code on the target system. The code will run with the privileges of the target service.

The vendor was notified on April 9, 2007.

Apple credits iDefense with reporting these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fixed version (5.5.5), available at:

http://developer.apple.com/opensource/server/streaming/index.html

The Apple advisory is available at:

http://docs.info.apple.com/article.html?artnum=305495

Vendor URL:  docs.info.apple.com/article.html?artnum=305495 (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), UNIX (OS X), Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents

Date:  Thu, 10 May 2007 14:46:04 -0700
Subject:  APPLE-SA-2007-05-10 Darwin Streaming Server 5.5.5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2007-05-10 Darwin Streaming Server 5.5.5

Darwin Streaming Server is an open source project available via:
http://developer.apple.com/opensource/server/streaming/index.html

Darwin Streaming Server 5.5.5 is now available and addresses
the following security issues:

Darwin Streaming Server
CVE-ID: CVE-2007-0749
Impact: A remote attacker may be able to cause an unexpected
application termination or arbitrary code execution
Description: A stack buffer overflow exists in the Darwin Streaming
Proxy. By sending maliciously-crafted RTSP requests, a remote
attacker can trigger the overflow, which may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue by performing additional validation of RTSP
requests. Credit to an anonymous researcher working with the
iDefense VCP for reporting this issue.

Darwin Streaming Server
CVE-ID: CVE-2007-0748
Impact: A remote attacker may be able to cause an unexpected
application termination or arbitrary code execution
Description: A heap buffer overflow exists in the Darwin Streaming
Proxy. By sending maliciously-crafted RTSP requests, a remote
attacker can trigger the overflow, which may lead to an unexpected
application termination or arbitrary code execution. This update
addresses the issue by performing additional validation of RTSP
requests. Credit to an anonymous researcher working with the
iDefense VCP for reporting this issue.

Information will also be posted to the Apple Product Security
web site:  http://docs.info.apple.com/article.html?artnum=61798

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRkOSMImzP5/bU5rtAQj+8QgA3oMujztZZkU6KQF9O5V7iuXMlF89lV8O
faOh4RuImVJfJRLz4jBsUGXgAWi3ZPtulyN210lZFN/drNMOjtL/3Gk6OPIT7iBw
dlIRcYMU3NUaGr0dNOx82TiNk9SVMbRAJUNM49744GAxYBsOrEYVj6ZWtoZ1y8aS
l+p5bI9bub7uLIYS2UI7WQpr8ZNCL9hMLiDS+3XhGFcW0JmQeL5CRphCEGCXotSW
nEHHcwICLv9seNpQ1udoyLgLJR2tfSHtRg/GlrzJynKnDk2yS82RQATbQf7s+ajd
0xngA1Qd6dawpy/6T2uPbtptqBHdOjzFNaV12MZ+ygIqYQNu7mgEdA==
=iuwu
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC