TITLE:
Apple QuickTime / iTunes Memory Corruption Vulnerability
SECUNIA ADVISORY ID:
SA18149
VERIFY ADVISORY:
http://secunia.com/advisories/18149/
CRITICAL:
Moderately critical
IMPACT:
Unknown, DoS
WHERE:
From remote
SOFTWARE:
Apple QuickTime 7.x
http://secunia.com/product/5090/
iTunes 6.x
http://secunia.com/product/5882/
DESCRIPTION:
Tom Ferris has discovered a vulnerability in Apple QuickTime /
iTunes, which can be exploited by malicious people to cause a DoS
(Denial of Service), and with an unknown impact.
The vulnerability is caused due to an error in handling malformed
".mov" files. This can be exploited to cause memory corruption, which
causes the program to crash. It has been reported that arbitrary code
execution may be possible. However, this has not been confirmed.
The vulnerability has been confirmed in Apple QuickTime Player 7.0.3
and iTunes 6.0.1.3. Other versions may also be affected.
SOLUTION:
Do not open ".mov" files from untrusted sources.
PROVIDED AND/OR DISCOVERED BY:
Tom Ferris
ORIGINAL ADVISORY:
http://security-protocols.com/advisory/sp-x21-advisory.txt
TITLE:
McAfee SecurityCenter "mcinsctl.dll" ActiveX File Overwrite
Vulnerability
SECUNIA ADVISORY ID:
SA18169
VERIFY ADVISORY:
http://secunia.com/advisories/18169/
CRITICAL:
Highly critical
IMPACT:
Manipulation of data, System access
WHERE:
From remote
SOFTWARE:
McAfee SecurityCenter 6.x
http://secunia.com/product/6437/
McAfee VirusScan 4.x
http://secunia.com/product/275/
McAfee VirusScan 8.x/2004
http://secunia.com/product/4740/
McAfee VirusScan 9.x/2005
http://secunia.com/product/4792/
McAfee VirusScan Enterprise 7.x
http://secunia.com/product/264/
McAfee VirusScan Enterprise 8.x
http://secunia.com/product/3948/
McAfee VirusScan Professional 7.x
http://secunia.com/product/265/
McAfee VirusScan Professional 8.x
http://secunia.com/product/5273/
DESCRIPTION:
Peter Vreugdenhil has reported a vulnerability in McAfee
SecurityCenter, which potentially can be exploited by malicious
people to compromise a vulnerable system.
The vulnerability is caused due to an error in restricting the
browser domain in which the "mcinsctl.dll" ActiveX control can be
instantiated. The control contains the "MCINSTALL.McLog" object that
can be used to write to a log file. This can be exploited to create
or append to arbitrary files, potentially allowing arbitrary code
execution by creating files in the user's startup folder.
Successful exploitation requires that the user is e.g. tricked into
visiting a malicious website.
The vulnerability has been reported in "mcinsctl.dll" version
4.0.0.83 that is included with McAfee VirusScan. Other products that
contain the vulnerability ActiveX control may also be affected.
SOLUTION:
The vulnerability has reportedly been fixed via automatic update.
PROVIDED AND/OR DISCOVERED BY:
Peter Vreugdenhil
ORIGINAL ADVISORY:
iDEFENSE:
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=358

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic