In association with heise online

03 December 2007, 11:51

Web pages infect PCs via Apple QuickTime vulnerability

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

The vulnerability in Apple's QuickTime media player reported last week is apparently already actively being exploited by the first web pages to infect visitors' Windows PCs with malware. Attackers can cause a buffer overflow and inject malicious code into vulnerable systems by sending crafted content type headers in RTSP datastreams. Users of Apple's iTunes multimedia software are also affected, as a current version of QuickTime is installed as part of the iTunes installation.

Although a proof of concept exploit was already available when the vulnerability was published, nobody had so far seen any pages which contained it. Now, a porn page monitored by Symantec loads the exploit through an IFrame and injects PCs with a downloader which subsequently retrieves and installs more malicious code. Apple has so far not released an update to resolve the problem.

Several measures can be taken as a workaround. In Internet Explorer it helps to set the kill bit for the QuickTime ActiveX control. Find instructions in the US-Cert's vulnerability notice. In Firefox, the plug-in can be deactivated simply by deleting it from the /Program Files/Mozilla Firefox/plugins path. Additional protective measures include deactivating JavaScript or restricting the use of the NoScript Firefox plug-in and disabling Apple QuickTime as a registered RTSP protocol handler. In addition, administrators can block the network's RTSP ports (TCP port 554 and UDP ports 6970-6999). The Internet Storm Center lists the IP addresses of several suspicious sites in its blog.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit