In association with heise online

10 September 2008, 13:24

Apple patches QuickTime and Bonjour

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Apple has released version 7.5.5 of its QuickTime framework which fixes nine security vulnerabilities. The company classifies eight of these as critical, as they can be exploited to inject and execute code on vulnerable systems. One of the bugs is present only in the Windows version.

The bugs are the result of integer, buffer and heap overflows and memory errors in, for example, the Indeo codec or parsers for processing QTVR (QuickTime Virtual Reality) and H.264 encoded films or PICT images. A successful attack merely requires the victim to open a specially crafted file. The update is available to download for Windows Vista, XP SP2 and SP3, Mac OS X v10.4.9 to v10.4.11 and Mac OS X v10.5.x.

Apple has also released update 1.0.5 for the Windows version of its Bonjour network service. The update fixes two vulnerabilities. The first relates to the infamous cache poisoning problem, to which mDNSResponder is also vulnerable. The second vulnerability enables an attacker to crash the mDNSResponder using crafted .local domain names. The update is available for Windows Vista, XP SP2 and SP3, Server 2003 and 2000.

In addition, Apple has also released information on the security vulnerabilities fixed in iTunes 8.0 and in the new iPod Touch firmware. Five vulnerabilities have been fixed in iPod Touch, of which one, in WebKit, can be exploited for code injection. In iTunes there are just two non-critical vulnerabilities.

See also:

(trk)

Print Version | Send by email | Permalink: http://h-online.com/-737241
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit