X

QuickTime 7.0.3 (#6): Security refinements in this release

QuickTime 7.0.3 (#6): Security refinements in this release

CNET staff

Secunia reports on some vulnerabilities in pre-7.0.3 version of Apple QuickTime, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

Among the vulnerabilities, which are patched in QuickTime 7.0.3:

  • An integer overflow error exists in the handling of a "Pascal" style string when loading a ".mov" video file. This can result in memory overwrite due to a large memory copy, potentially allowing arbitrary code execution via a specially crafted video file.
  • An integer overflow error exists in the handling of certain movie attributes when loading a ".mov" video file. This can result in memory overwrite due to a large memory copy, potentially allowing arbitrary code execution via a specially crafted video file

The fix for these vulnerabilities is to upgrade to QuickTime 7.0.3.

Previous coverage:

Resources

  • vulnerabilities
  • QuickTime 7.0.3
  • QuickTime 7.0.3 (#5): Extr...
  • QuickTime 7.0.3 (#4): Extr...
  • QuickTime 7.0.3 (#3): Prob...
  • QuickTime 7.0.3 (#2): Now ...
  • Apple releases QuickTime 7...
  • More from Late-Breakers