

- #Quicktime 7.5 windows xp mac os x
- #Quicktime 7.5 windows xp movie
- #Quicktime 7.5 windows xp update
- #Quicktime 7.5 windows xp Patch
- #Quicktime 7.5 windows xp code
#Quicktime 7.5 windows xp code
However, Richard Lemon of Code Lemon found a vulnerability in QuickTime 7.5 that was exploitable solely on machines running Windows Vista, XP SP2 and SP3. As with the previous flaw, improved bounds checking was included with QuickTime 7.6 to address this issue.
#Quicktime 7.5 windows xp movie
Based on his findings, Apple discovered that viewing this kind of maliciously crafted movie file might also lead to an unexpected application termination / arbitrary code execution.
#Quicktime 7.5 windows xp update
“This update addresses the issue through improved bounds checking,” Apple explains.Ĭredit for finding that a buffer overflow exists in the handling of MPEG-2 video files with MP3 audio content was given to Chad Dougherty of the CERT Coordination Center for reporting this issue. Opening a maliciously crafted AVI movie file may lead to an unexpected application termination or arbitrary code execution,” Apple says. According to the bug's description, “a heap buffer overflow may occur while processing an AVI movie file. The post outlines that accessing maliciously crafted RTSP URLs, QTVR, AVI and other movie files may lead to an unexpected application termination or arbitrary code execution on both Mac and Windows running platforms.įor example, Apple disclosed that viewing a maliciously crafted AVI movie file might lead to the above-mentioned events as discovered by an anonymous researcher working with TippingPoint's Zero Day Initiative.
#Quicktime 7.5 windows xp mac os x

#Quicktime 7.5 windows xp Patch
Solutions of limiting this vulnerability until a new patch is released, can be found here. When users click on a link for a malicious RTSP stream, an attacker might be able to execute arbitrary code on the compromised system. "This vulnerability may be exploited by convincing a user to connect to a specially crafted RTSP stream." RTSP is the Real-Time Streaming Protocol, which QuickTime supports. "Apple QuickTime contains a stack buffer overflow vulnerability in the way QuickTime handles the RTSP Content-Type header," US-CERT said. Computer Emergency Readiness Team, QuickTime versions 7.2 and 7.3, and perhaps earlier versions, contain a buffer-overflow bug. Apple's QuickTime is vulnerable to malware disguised as streaming video, and attack code has been published on the web site.

There is no word yet on whether Mac OS X is vulnerable to the new QuickTime bug. Apple updated QuickTime to version 7.3 recently to address a much-exploited bug, but a new QuickTime vulnerability has emerged, prompting security agencies to issue warnings to those running QuickTime on either Windows XP or Windows Vista.
