CVE-2011-1417

Current Description

Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.

Basic Data

PublishedMarch 11, 2011
Last ModifiedMarch 30, 2012
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-189
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSAppleMac Os X10.6.0*******
    2.3OSAppleMac Os X10.6.1*******
    2.3OSAppleMac Os X10.6.2*******
    2.3OSAppleMac Os X10.6.3*******
    2.3OSAppleMac Os X10.6.4*******
    2.3OSAppleMac Os X10.6.5*******
    2.3OSAppleMac Os X********10.6.6
    2.3OSAppleMac Os X Server10.6.0*******
    2.3OSAppleMac Os X Server10.6.1*******
    2.3OSAppleMac Os X Server10.6.2*******
    2.3OSAppleMac Os X Server10.6.3*******
    2.3OSAppleMac Os X Server10.6.4*******
    2.3OSAppleMac Os X Server10.6.5*******
    2.3OSAppleMac Os X Server********10.6.6
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSAppleIphone Os1.0.0*******
    2.3OSAppleIphone Os1.0.1*******
    2.3OSAppleIphone Os1.0.2*******
    2.3OSAppleIphone Os1.1.0*******
    2.3OSAppleIphone Os1.1.1*******
    2.3OSAppleIphone Os1.1.2*******
    2.3OSAppleIphone Os1.1.3*******
    2.3OSAppleIphone Os1.1.4*******
    2.3OSAppleIphone Os1.1.5*******
    2.3OSAppleIphone Os2.0*******
    2.3OSAppleIphone Os2.1*******
    2.3OSAppleIphone Os2.1.1*******
    2.3OSAppleIphone Os2.2*******
    2.3OSAppleIphone Os2.2.1*******
    2.3OSAppleIphone Os3.0*******
    2.3OSAppleIphone Os3.0.1*******
    2.3OSAppleIphone Os3.1*******
    2.3OSAppleIphone Os3.1.2*******
    2.3OSAppleIphone Os3.2*******
    2.3OSAppleIphone Os3.2.1*******
    2.3OSAppleIphone Os3.2.2*******
    2.3OSAppleIphone Os4.0*******
    2.3OSAppleIphone Os4.0.1*******
    2.3OSAppleIphone Os4.0.2*******
    2.3OSAppleIphone Os4.1*******
    2.3OSAppleIphone Os4.2*******
    2.3OSAppleIphone Os4.2.1*******
    2.3OSAppleIphone Os********4.2.5
    2.3OSAppleIphone Os4.3.0*******
    2.3OSAppleIphone Os4.3.1*******

Vulnerable Software List

VendorProductVersions
Apple Iphone Os *, 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 2.0, 2.1, 2.1.1, 2.2, 2.2.1, 3.0, 3.0.1, 3.1, 3.1.2, 3.2, 3.2.1, 3.2.2, 4.0, 4.0.1, 4.0.2, 4.1, 4.2, 4.2.1, 4.3.0, 4.3.1
Apple Mac Os X Server *, 10.6.0, 10.6.1, 10.6.2, 10.6.3, 10.6.4, 10.6.5
Apple Mac Os X *, 10.6.0, 10.6.1, 10.6.2, 10.6.3, 10.6.4, 10.6.5

References

NameSourceURLTags
http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011MISC
APPLE-SA-2011-04-14-1http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.htmlAPPLE
APPLE-SA-2011-04-14-2http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.htmlAPPLE
APPLE-SA-2011-10-12-5http://lists.apple.com/archives/Security-announce/2011//Oct/msg00005.htmlAPPLEVendor Advisory
APPLE-SA-2011-03-21-1http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.htmlAPPLEPatch Vendor Advisory
44154http://secunia.com/advisories/44154SECUNIAVendor Advisory
http://support.apple.com/kb/HT4581http://support.apple.com/kb/HT4581CONFIRMPatch Vendor Advisory
http://support.apple.com/kb/HT4607http://support.apple.com/kb/HT4607CONFIRM
http://support.apple.com/kb/HT5003http://support.apple.com/kb/HT5003CONFIRMVendor Advisory
http://www.zdnet.com/blog/security/charlie-miller-wins-pwn2own-again-with-iphone-4-exploit/8378http://www.zdnet.com/blog/security/charlie-miller-wins-pwn2own-again-with-iphone-4-exploit/8378MISC
http://www.zerodayinitiative.com/advisories/ZDI-11-109/http://www.zerodayinitiative.com/advisories/ZDI-11-109/MISC