X

Apple fixes seven Quicktime flaws

Patch includes both Mac OX X and Windows versions.

Robert Vamosi Former Editor
As CNET's former resident security expert, Robert Vamosi has been interviewed on the BBC, CNN, MSNBC, and other outlets to share his knowledge about the latest online threats and to offer advice on personal and corporate security.
Robert Vamosi
4 min read

Apple on Monday released QuickTime version 7.3, addressing seven security vulnerablities for QuickTime 7.2 and earlier. Some of the flaws are serious and can be exploited by luring a victim to a Web site that contains a malicious crafted image or movie. The patches include both Mac OS X and Windows. A month ago, Apple patched another serious flaw within QuickTime for Windows. The latest version is available through the built-in software update feature of QuickTime or from the Apple Downloads site.

QuickTime (image description)
This patch affects users of QuickTime 7.2 on Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5, Windows Vista, and Windows XP SP2, and addresses the vulnerability in CVE-2007-2395. According to Apple, "a memory corruption issue exists in QuickTime's handling of image description atoms. By enticing a user to open a maliciously crafted movie file, an attacker may cause an unexpected application termination or arbitrary code execution." Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution." Apple credits Dylan Ashe of Adobe Systems for reporting this vulnerability.

QuickTime (Sample Table Sample Descriptor (STSD) )
This patch affects users of QuickTime 7.2 on Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5, Windows Vista, and Windows XP SP2, and addresses the vulnerability in CVE-2007-3750. Apple says "a heap buffer overflow exists in QuickTime Player's handling of Sample Table Sample Descriptor (STSD) atoms. By enticing a user to open a maliciously crafted movie file, an attacker may cause an unexpected application termination or arbitrary code execution." Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. Apple credits Tobias Klein of www.trapkit.de for reporting this vulnerability.

QuickTime (Java)
This patch affects users of QuickTime 7.2 on Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5, Windows Vista, and Windows XP SP2, and addresses the vulnerability in CVE-2007-3751. According to Apple, "multiple vulnerabilities exist in QuickTime for Java, which may allow untrusted Java applets to obtain elevated privileges. By enticing a user to visit a Web page containing a maliciously crafted Java applet, an attacker may cause the disclosure of sensitive information and arbitrary code execution with elevated privileges." Untrusted Java applets may obtain elevated privileges. Apple credits Adam Gowdiak for reporting this issue.

QuickTime (PICT image processing I)
This patch affects users of QuickTime 7.2 on Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5, Windows Vista, and Windows XP SP2, and addresses the vulnerability in CVE-2007-4672. Apple says "a stack buffer overflow exists in PICT image processing. By enticing a user to open a maliciously crafted image, an attacker may cause an unexpected application termination or arbitrary code execution." A user opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution. Apple credits Ruben Santamarta of ReverseMode.com working with TippingPoint and the Zero Day Initiative for reporting this issue.

QuickTime (PICT image processing II)
This patch affects users of QuickTime 7.2 on Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5, Windows Vista, and Windows XP SP2, and addresses the vulnerability in CVE-2007-4676. According to Apple "a heap buffer overflow exists in PICT image processing. By enticing a user to open a maliciously crafted image, an attacker may cause an unexpected application termination or arbitrary code execution." A user opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution. Apple credits Ruben Santamarta of ReverseMode.com working with TippingPoint and the Zero Day Initiative for reporting this issue.

QuickTime (QTVR)
This patch affects users of QuickTime 7.2 on Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5, Windows Vista, and Windows XP SP2, and addresses the vulnerability in CVE-2007-4675. Apple says "a heap buffer overflow exists in QuickTime's handling of panorama sample atoms in QTVR (QuickTime Virtual Reality) movie files. By enticing a user to view a maliciously crafted QTVR file, an attacker may cause an unexpected application termination or arbitrary code execution." Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution. Apple credits Mario Ballano from 48Bits.com working with the VeriSign iDefense VCP for reporting this issue.

QuickTime (color table)
This patch affects users of QuickTime 7.2 on Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Mac OS X v10.5, Windows Vista, and Windows XP SP2, and addresses the vulnerability in CVE-2007-4677. According to Apple, "a heap buffer overflow exists in the parsing of the color table atom when opening a movie file. By enticing a user to open a maliciously crafted movie file, an attacker may cause an unexpected application termination or arbitrary code execution." Apple credits Ruben Santamarta of ReverseMode.com and Mario Ballano of 48Bits.com working with TippingPoint and the Zero Day Initiative for reporting this issue.