XP, Vista and Mac OS X versions affected
Apple has issued an update for the Mac and Windows versions of QuickTime.
The update addresses 11 vulnerabilities in the multimedia player software, nine of which could be exploited by an attacker to remotely execute code on a target system.
All the flaws affect Windows XP and Vista systems. Eight of the vulnerabilities also affect the Mac OS X version of QuickTime.
Five remote code execution flaws could be exploited by way of specially-crafted movie files.
Such files could also be used to execute another flaw which allows for the launching of external URLs, which Apple said could allow for information disclosure.
Three of the flaws could be exploited by way of Pict files and used by an attacker for remote code execution.
The remaining two flaws include a remote code execution flaw in the handling of QuickTime VR files and a flaw which could allow Java applets to obtain elevated privileges.
The QuickTime update can be obtained via Apple's Software Update utility or at the Apple Downloads site.
Apple has issued an update for the Mac and Windows versions of QuickTime.
The update addresses 11 vulnerabilities in the multimedia player software, nine of which could be exploited by an attacker to remotely execute code on a target system.
All the flaws affect Windows XP and Vista systems. Eight of the vulnerabilities also affect the Mac OS X version of QuickTime.
Five remote code execution flaws could be exploited by way of specially-crafted movie files.
Such files could also be used to execute another flaw which allows for the launching of external URLs, which Apple said could allow for information disclosure.
Three of the flaws could be exploited by way of Pict files and used by an attacker for remote code execution.
The remaining two flaws include a remote code execution flaw in the handling of QuickTime VR files and a flaw which could allow Java applets to obtain elevated privileges.
The QuickTime update can be obtained via Apple's Software Update utility or at the Apple Downloads site.
0 comments:
Post a Comment Subscribe to Post Comments (Atom)