QuickTime 7.1.3 closes several security holes
Version 7.1.3 of the popular media player QuickTime closes several security holes. Prepared files in the formats H.264, QuickTime, FLC, FlashPix and SGI run on prior versions could be used to sneak in malicious code that then runs with the user's rights.
As usual, Apple did not provide more details about the holes, but only described their effects. All affected formats can trigger buffer overruns used by attackers to smuggle malware onto the system. Manipulated FlashPix files can also trigger an exception through which a non-initialised object is not cleaned up – a hole appropriate for planting code.
The error affects QuickTime versions prior to 7.1.3 on Mac OS X 10.3.9 and later as well as Windows 2000 and XP. QuickTime users should install the new version of the software as soon as possible.
- About the security content of QuickTime 7.1.3, Summary of the closed security holes by Apple
- Download of the current QuickTime version for Mac OS X
- Download of the current QuickTime version for Windows
(ehe)