Apple QuickTime Multiple Vulnerabilities[Aggiornate Quick time]

ERCOLINO

Membro dello Staff
Amministratore
Registrato
3 Marzo 2003
Messaggi
250.657
Località
Torino
Secunia Advisory: SA26034
Release Date: 2007-07-12

Critical: Highly critical
Impact: Exposure of sensitive information
DoS
System access
Where: From remote
Solution Status: Vendor Patch

Software: Apple QuickTime 7.x

CVE reference: CVE-2007-2295 (Secunia mirror)
CVE-2007-2296 (Secunia mirror)
CVE-2007-2392 (Secunia mirror)
CVE-2007-2393 (Secunia mirror)
CVE-2007-2394 (Secunia mirror)
CVE-2007-2396 (Secunia mirror)
CVE-2007-2397 (Secunia mirror)
CVE-2007-2402 (Secunia mirror)




Description:
Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

1) An unspecified error exists in the processing of H.264 movies. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted H.264 movie.

2) An unspecified error exists in the processing of movie files. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted movie file.

3) An integer overflow error exists in the handling of .m4v files and can be exploited to execute arbitrary code when a user accesses a specially crafted .m4v file.

4) An integer overflow error exists in the handling of the "author" and "title" fields when parsing SMIL files. This can be exploited to cause a heap-based buffer overflow and may allow execution of arbitrary code when a user opens a specially crafted SMIL file.

5) A design error exists in QuickTime for Java, which can be exploited to disable security checks and execute arbitrary code when a user visits a web site containing a specially crafted Java applet.

6) A design error exists in QuickTime for Java, which can be exploited to bypass security checks and read and write to process memory. This can lead to execution of arbitrary code when a user visits a web site containing a specially crafted Java applet.

7) A design error exists in QuickTime for Java due to JDirect exposing interfaces that may allow loading arbitrary libraries and freeing arbitrary memory. This can be exploited to execute arbitrary code when a user visits a web site containing a specially crafted Java applet.

8) A design error exists in QuickTime for Java, which can be exploited to capture the user's screen content when a user visits a web site containing a specially crafted Java applet.

The vulnerabilities are reported in versions prior to 7.2.

Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable:
http://secunia.com/software_inspector/

Solution:
Update to version 7.2.


QuickTime 7.2 for Mac:
http://www.apple.com/support/downloads/quicktime72formac.html

QuickTime 7.2 for Windows:
http://www.apple.com/support/downloads/quicktime72forwindows.html



Bollettino Secunia
 
insomma .......non se ne e' salvato uno............

flash
java
QT
ce' altro?????:lol:
 
E' da segnalare che Quicktime 7.2 aggiunge (FINALMENTE!) il supporto per i video a tutto schermo senza dover necessariamente acquistare la licenza Pro (che a questo punto serve per la conversione e modifica dei file multimediali).
 
Indietro
Alto Basso