Jump to content
TCH-Thomas

Apple Quicktime Multiple Vulnerabilities

Recommended Posts

From Secunia http://secunia.com/advisories/26034/

Rating: Highly critical

 

Description:

Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

 

1) An unspecified error exists in the processing of H.264 movies. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted H.264 movie.

 

2) An unspecified error exists in the processing of movie files. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted movie file.

 

3) An integer overflow error exists in the handling of .m4v files and can be exploited to execute arbitrary code when a user accesses a specially crafted .m4v file.

 

4) An integer overflow error exists in the handling of the "author" and "title" fields when parsing SMIL files. This can be exploited to cause a

heap-based buffer overflow and may allow execution of arbitrary code when a user opens a specially crafted SMIL file.

 

5) A design error exists in QuickTime for Java, which can be exploited to disable security checks and execute arbitrary code when a user visits a web site containing a specially crafted Java applet.

 

6) A design error exists in QuickTime for Java, which can be exploited to bypass security checks and read and write to process memory. This can lead to execution of arbitrary code when a user visits a web site containing a specially crafted Java applet.

 

7) A design error exists in QuickTime for Java due to JDirect exposing interfaces that may allow loading arbitrary libraries and freeing arbitrary memory. This can be exploited to execute arbitrary code when a user visits a web site containing a specially crafted Java applet.

 

8) A design error exists in QuickTime for Java, which can be exploited to capture the user's screen content when a user visits a web site containing a specially crafted Java applet.

 

The vulnerabilities are reported in versions prior to 7.2.

 

Solution:

Update to version 7.2.

 

QuickTime 7.2 for Mac

 

QuickTime 7.2 for Windows

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...