Jump to content

QuickTime Update


A Nonny Moose
 Share

11 posts in this topic

Recommended Posts

There are three things this update delivers:

 

QuickTime

 

CVE-ID: CVE-2007-6166

 

Available for: Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5 or later, Windows Vista, XP SP2

 

Impact: Viewing a maliciously crafted RTSP movie may lead to an unexpected application termination or arbitrary code execution

 

Description: A buffer overflow exists in QuickTime's handling of Real Time Streaming Protocol (RTSP) headers. By enticing a user to view a maliciously crafted RTSP movie, an attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue by ensuring that the destination buffer is sized to contain the data.

 

QuickTime

 

CVE-ID: CVE-2007-4706

 

Available for: Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5 or later, Windows Vista, XP SP2

 

Impact: Viewing a maliciously crafted QTL file may lead to an unexpected application termination or arbitrary code execution

 

Description: A heap buffer overflow exists in QuickTime's handling of QTL files. By enticing a user to view a maliciously crafted QTL file, an attacker may cause an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking.

 

QuickTime

 

CVE-ID: CVE-2007-4707

 

Available for: Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5 or later, Windows Vista, XP SP2

 

Impact: Multiple vulnerabilities in QuickTime's Flash media handler

 

Description: Multiple vulnerabilities exist in QuickTime's Flash media handler, the most serious of which may lead to arbitrary code execution. With this update, the Flash media handler in QuickTime is disabled except for a limited number of existing QuickTime movies that are known to be safe. Credit to Tom Ferris of Adobe Secure Software Engineering Team (ASSET), Mike Price of McAfee Avert Labs, and security researchers Lionel d'Hauenens & Brian Mariani of Syseclabs for reporting this issue.

 

Now for the chorus of "will this work on such and such a Hack?"

Link to comment
Share on other sites

I hope you saw my white text.

 

We're only worried about system updates. App updates don't break Hacks...

Yeah, Apps updates but QT sometimes replaces some system files so, there is always an exception.

Link to comment
Share on other sites

 Share

×
×
  • Create New...