QuickTime 7.0.3 (#6): Security refinements in this release
QuickTime 7.0.3 (#6): Security refinements in this release
Secunia reports on some vulnerabilities in pre-7.0.3 version of Apple QuickTime, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.
Among the vulnerabilities, which are patched in QuickTime 7.0.3:
- An integer overflow error exists in the handling of a "Pascal" style string when loading a ".mov" video file. This can result in memory overwrite due to a large memory copy, potentially allowing arbitrary code execution via a specially crafted video file.
- An integer overflow error exists in the handling of certain movie attributes when loading a ".mov" video file. This can result in memory overwrite due to a large memory copy, potentially allowing arbitrary code execution via a specially crafted video file
The fix for these vulnerabilities is to upgrade to QuickTime 7.0.3.
Previous coverage:
- QuickTime 7.0.3 (#5): Extremely slow iPod-ready exporting; More problems with movie trailers
- QuickTime 7.0.3 (#4): Extremely slow MPEG-4 export times, problems exporting to iPod-compatible format; more
- QuickTime 7.0.3 (#3): Problems with Ac3-encoded audio linger; Some third-party applications exhibiting problems; more
- QuickTime 7.0.3 (#2): Now appearing in Software Update; Video skipping problem solved
- Apple releases QuickTime 7.0.3 -- required for iTunes 6.0, release notes
Resources
Computing Guides
Laptops
Desktops & Monitors
Computer Accessories
Photography
Tablets & E-Readers
3D Printers
Computing Coupons