In association with heise online

27 July 2010, 17:24

Critical vulnerability in QuickTime 7.6.6

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

QuickTime Logo According to security services provider Secunia, the latest version of Apple's QuickTime 7 media player for Windows contains a critical vulnerability that could be exploited by an attacker to compromise a user's system. The security specialist says that the issue is caused by a boundary error in the streaming component used by QuickTime and can be used to initiate a stack-based buffer overflow. For an attack to be successful, a victim must first open a specially crafted web page.

QuickTime 7.6.6 (build 1671), released at the end of March, 2010, is the latest version of the 7.x branch. It was released to close a total of 16 critical vulnerabilities, all of which could be used by an attacker to inject and execute arbitrary code with the users current privileges.

It's currently unclear if previous versions of QuickTime for Windows or Mac OS X are affected. Apple has yet to respond to respond to the advisory.

See also:

(crve)

Print Version | Send by email | Permalink: http://h-online.com/-1046499
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit