Apple Releases Security Updates for QuickTime
Original release date: July 12, 2007
Last revised: --
Source: US-CERT
Systems Affected
Apple QuickTime on systems running
- Apple Mac OS X
- Microsoft Windows
Overview
Apple QuickTime contains multiple vulnerabilities. Exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
I. Description
Apple QuickTime 7.2 resolves multiple vulnerabilities in the way Java applets and various types of media files are handled. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted Java applet or media file with a vulnerable version of QuickTime. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page.
Note that QuickTime ships with Apple iTunes.
For more information, please refer to the Vulnerability Notes Database.
II. Impact
These vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or commands and cause a denial-of-service condition. For further information, please see the Vulnerability Notes Database.
III. Solution
Upgrade QuickTime
Upgrade to QuickTime 7.2. This and other updates for Mac OS X are available via Apple Update.
On Microsoft Windows, QuickTime users can install the update by using the built-in auto-update mechanism, Apple Software Update, or by installing the update manually.
Disable QuickTime in your web browser
An attacker may be able to exploit some of these vulnerabilities by persuading a user to access a specially crafted media file with a web browser. Disabling QuickTime in your web browser may defend against this attack vector. For more information, refer to the Securing Your Web Browser document.
Disable Java in your web browser
An attacker may be able to exploit some of these vulnerabilities by persuading a user to access a specially crafted Java applet with a web browser. Disabling Java in your web browser may defend against this attack vector. Instructions for disabling Java can be found in the Securing Your Web Browser document.
References
Feedback can be directed to US-CERT.
Produced 2007 by US-CERT, a government organization. Terms of use
Revision History
July 12, 2007: Initial release