In association with heise online

13 September 2006, 14:01

QuickTime 7.1.3 closes several security holes

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Version 7.1.3 of the popular media player QuickTime closes several security holes. Prepared files in the formats H.264, QuickTime, FLC, FlashPix and SGI run on prior versions could be used to sneak in malicious code that then runs with the user's rights.

As usual, Apple did not provide more details about the holes, but only described their effects. All affected formats can trigger buffer overruns used by attackers to smuggle malware onto the system. Manipulated FlashPix files can also trigger an exception through which a non-initialised object is not cleaned up – a hole appropriate for planting code.

The error affects QuickTime versions prior to 7.1.3 on Mac OS X 10.3.9 and later as well as Windows 2000 and XP. QuickTime users should install the new version of the software as soon as possible.

Please see also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit