Note that if you upgraded your Quicktime after October 12th, you are OK...
Secunia is reporting this on November 4, although Apple provided the fix on October 12.
Note, this affects both Macintosh AND Windows versions of Quicktime. UPGRADE NOW!
|
Apple Plugs QuickTime Code Execution Holes
By Ryan Naraine
November 4, 2005
Updated: A new version of the QuickTime media player protects against "highly critical" system access and denial-of-service vulnerabilities.
Multiple security flaws in Apple Computer Inc.'s QuickTime media player could put users at risk of code execution attacks, the company confirmed in an advisory issued late Thursday.
The vulnerabilities, rated "highly critical," could give malicious hackers an open door to take over a vulnerable system or to launch denial-of-service attacks.
Affected software include QuickTime 6.x through 7.x. Apple recommends that QuickTime users upgrade to version 7.0.3 immediately.
In all, the upgrade covers four vulnerabilities. The most dangerous is described as an integer overflow error in the handling of a "Pascal" style string when loading a ".mov" video file. This can result in memory overwrite due to a large memory copy, potentially allowing arbitrary code execution via a specially crafted video file.
Mac OS X update swats five security bugs.
A second integer overflow error also exists in the handling of certain movie attributes when loading a ".mov" video file. This can also result in memory overwrite and potential code execution via a rigged video file.
The patch also corrects a NULL pointer dereferencing error when QuickTime handles certain missing movie attributes from a video file. This can be exploited to crash an application that uses QuickTime when a malicious video file is loaded.
The fourth flaw is a boundary error in the QuickTime PictureViewer when decompressing PICT data. This may be exploited to cause a memory overwrite, potentially allowing arbitrary code execution via a specially crafted PICT picture file.
The vulnerabilities were discovered and reported to Apple by private researcher Piotr Bania.
An Apple spokesperson said the new QuickTime versions were issued on Oct. 12, but full details on the vulnerabilities were not posted until late Thursday.
Secunia Warns About Already Patched QuickTime Flaws
by MacObserver Staff, 8:45 AM EST, November 4th, 2005
Secunia issued a warning about four security flaws in QuickTime versions 6.5.2 and 7.0.1 on Friday. The flaws, which could potentially lead to a Denial of Service attack, were patched by Apple with the QuickTime 7.0.3 updater on October 12.
The four vulnerabilities addressed with the QuickTime 7.0.3 update include two integer overflow errors in .mov files, a NULL pointer error in maliciously crafted video files, and a boundary error in certain PICT files when viewed in Classic's QuickTime PictureViewer application. A full description of each flaw is available an Apple Knowledge Base security article.
Users with a version of QuickTime that falls under the advisory can address the issue simply by updating to the new version through Software Update, or by downloading and installing the QuickTime 7.0.3 updater.
The downside is that QuickTime Pro 6 keys don't work in QuickTime 7, requiring the purchase of a new US$29.99 license.
Secunia's warning, dated November 4, is a little ill timed, considering Apple released an update for the noted issues nearly a month ago.