Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple sounds alarm over QuickTime flaws
CNET News ^ | 111/4/2005 | By Dawn Kawamoto

Posted on 11/05/2005 1:52:34 AM PST by Swordmaker

Apple Computer late Thursday issued an alert about flaws in its QuickTime media player that could allow a malicious attacker to launch a denial-of-service attack or remote code execution.

QuickTime versions 6.5.2 and 7.0.1 for the Mac OS X operating system are affected by the vulnerabilities, as well as some versions for Microsoft Windows, according to a Friday report by security company Secunia, which rated the vulnerabilities "highly critical."

Apple has issued an update, QuickTime 7.0.3, to fix the four flaws. The patch was posted to Apple's Web site on Oct. 12.

One vulnerability can result in a denial-of-service, or DOS, attack against any application loading remotely originated content. The flaw involves a missing movie attribute, which is interpreted as an extension. The absence of the actual extension, however, is not detected, resulting in a "dereference of a null pointer," Apple warned.

Another security hole involves an integer overflow that may be remotely exploited through a specially crafted video file. This could lead to an arbitrary execution of code.

"Three of the vulnerabilities can launch malicious code that allows an attacker to snoop on users," said Thomas Kristensen, Secunia's chief technology officer. "The other vulnerability is a DOS attack that will only work in a few cases and crash the media player when it tries to open a file."

Last June, Apple released QuickTime 7.0.1 to address a security flaw and deliver several improvements to its media player. The update was designed to modify the Quartz Composer plug-in, which previously could allow an attacker to tap into local data and distribute it to an arbitrary Web site.


TOPICS: Computers/Internet
KEYWORDS: apple; macintosh; quicktime; security; windows

1 posted on 11/05/2005 1:52:36 AM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Bush2000; antiRepublicrat; Action-America; eno_; Glenn; gmill; BigFinn; backslacker; Brian Allen; ..
QUICKTIME security vulnerability... PING!

Note that if you upgraded your Quicktime after October 12th, you are OK...

Secunia is reporting this on November 4, although Apple provided the fix on October 12.

Note, this affects both Macintosh AND Windows versions of Quicktime. UPGRADE NOW!

If you want on or off the Mac Ping List, Freepmail me.


2 posted on 11/05/2005 1:55:04 AM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Apple Plugs QuickTime Code Execution Holes
By Ryan Naraine
November 4, 2005

Updated: A new version of the QuickTime media player protects against "highly critical" system access and denial-of-service vulnerabilities.

Multiple security flaws in Apple Computer Inc.'s QuickTime media player could put users at risk of code execution attacks, the company confirmed in an advisory issued late Thursday.

The vulnerabilities, rated "highly critical," could give malicious hackers an open door to take over a vulnerable system or to launch denial-of-service attacks.

Affected software include QuickTime 6.x through 7.x. Apple recommends that QuickTime users upgrade to version 7.0.3 immediately.

In all, the upgrade covers four vulnerabilities. The most dangerous is described as an integer overflow error in the handling of a "Pascal" style string when loading a ".mov" video file. This can result in memory overwrite due to a large memory copy, potentially allowing arbitrary code execution via a specially crafted video file.

Mac OS X update swats five security bugs.

A second integer overflow error also exists in the handling of certain movie attributes when loading a ".mov" video file. This can also result in memory overwrite and potential code execution via a rigged video file.

The patch also corrects a NULL pointer dereferencing error when QuickTime handles certain missing movie attributes from a video file. This can be exploited to crash an application that uses QuickTime when a malicious video file is loaded.

The fourth flaw is a boundary error in the QuickTime PictureViewer when decompressing PICT data. This may be exploited to cause a memory overwrite, potentially allowing arbitrary code execution via a specially crafted PICT picture file.

The vulnerabilities were discovered and reported to Apple by private researcher Piotr Bania.

An Apple spokesperson said the new QuickTime versions were issued on Oct. 12, but full details on the vulnerabilities were not posted until late Thursday.


3 posted on 11/05/2005 1:57:38 AM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Secunia Warns About Already Patched QuickTime Flaws
by MacObserver Staff, 8:45 AM EST, November 4th, 2005

Secunia issued a warning about four security flaws in QuickTime versions 6.5.2 and 7.0.1 on Friday. The flaws, which could potentially lead to a Denial of Service attack, were patched by Apple with the QuickTime 7.0.3 updater on October 12.

The four vulnerabilities addressed with the QuickTime 7.0.3 update include two integer overflow errors in .mov files, a NULL pointer error in maliciously crafted video files, and a boundary error in certain PICT files when viewed in Classic's QuickTime PictureViewer application. A full description of each flaw is available an Apple Knowledge Base security article.

Users with a version of QuickTime that falls under the advisory can address the issue simply by updating to the new version through Software Update, or by downloading and installing the QuickTime 7.0.3 updater.

The downside is that QuickTime Pro 6 keys don't work in QuickTime 7, requiring the purchase of a new US$29.99 license.

Secunia's warning, dated November 4, is a little ill timed, considering Apple released an update for the noted issues nearly a month ago.


4 posted on 11/05/2005 1:59:13 AM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Secunia's Very Late announcement.
5 posted on 11/05/2005 2:01:01 AM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I'm shocked, shocked, shocked! And here, I thought that Macs weren't vulnerable to attack...


6 posted on 11/05/2005 8:35:01 AM PST by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bush2000
I'm shocked, shocked, shocked! And here, I thought that Macs weren't vulnerable to attack...

Read it again, Bush... it WAS Quicktime that was vulnerable... for both Windows and Mac OSX... and for Macs, merely using Software Update (automatic) the vulnerability was patched.

7 posted on 11/05/2005 12:00:05 PM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

Though, you just have to wonder what else 7.0.3 might cripple. Apple s**tted-up the Player app in 7; it's a good thing the USEFUL 6.5 player still works!


8 posted on 11/05/2005 3:22:25 PM PST by solitas (So what if I support an OS that has fewer flaws than yours? 'Mystic' dual 500 G4's, OSX.4.2)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker
Read it again, Bush... it WAS Quicktime that was vulnerable... for both Windows and Mac OSX...

So what. The bottom line is that having Quicktime on your machine leaves you open to critical vulnerabilities. Spin that however you like.

... and for Macs, merely using Software Update (automatic) the vulnerability was patched.

So I presume you won't criticize MS the next time it releases a security patch and it's distributed over Windows Update, eh? /SARCASM
9 posted on 11/07/2005 3:32:40 PM PST by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Bush2000
So I presume you won't criticize MS the next time it releases a security patch and it's distributed over Windows Update, eh? /SARCASM

When have I criticized Microsoft for FIXING their holey OS through Windows Update? I applaud them when they make it more secure.

10 posted on 11/07/2005 8:03:05 PM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 9 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson