In association with heise online

13 September 2007, 12:36

QuickTime opens up a security leak in Firefox

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

In a blog entry, the security specialist Petko Petkov (pdp) has drawn attention to a vulnerability via which attackers using specially crafted QuickTime media files can execute any JavaScript code in Firefox with maximum rights, or run programs on the computer. For this to work, Firefox has to be set up as the default browser and Apple's QuickTime (or QuickTime Alternative, according to some reports) has to be installed on the computer – hardly an unusual configuration.

The problem comes up when the QuickTime plug-in in Firefox processes QuickTime link files (.qtl). As a rule, these XML files contain a link to the actual media file and, in some cases, yet more control instructions that the QuickTime player obeys. QuickTime interprets these instructions even if the file has a different filename extension that is also associated with the QuickTime plug-in, such as .mov or .mp3.

The QuickTime - Firefox hole demonstrated
QuickTime link files can also execute any JavaScript via a modified filename extension.

Using the parameter qtnext in .qtl files, any JavaScript code can be executed in the browser. If an attacker also sets the -chrome switch there, the JavaScript runs in the chrome context – and thus has access rights to local resources. Petkov says an attacker can install any browser component this way – such as back doors, for example. If the user has administrator rights, any access at operating-system level would be conceivable. heise Security was able to reproduce the problem with Firefox 2.0.0.6 and QuickTime 7.2.0.240 under Windows XP with Service Pack 2.

But Petkov does not explain how users can protect themselves. Users report that the NoScript extension blocks the sample exploits that Petkov provides in his blog to demonstrate this security hole. When tested by heise security, the sample exploits did indeed fail if the NoScript extension was installed. Another alternative is to uninstall QuickTime. Affected uers should therefore either install the NoScript extension, set up a different default browser such as Opera, or uninstall QuickTime until Apple issues an updated software version.

See also:

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-733638
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit