Apple patches two QuickTime holes

Powered by SC Magazine
 

Java flaws affect Mac and Windows versions.

Apple has released a security update addressing two vulnerabilities in its QuickTime multimedia player.

Mac OS X and Windows versions of the software are both affected, and the flaws could lead to unintentional disclosure of information or the ability to remotely execute malware.

The first fix addresses a flaw in the handling of JavaScript applets that could allow for remote code execution.

The exploit occurs when an attacker directs the user to a web page containing a specially crafted Java applet. The update allows the software to check and prevent the launch of the malformed code.

The second vulnerability also lies within the Java component of QuickTime. Apple said that unpatched versions of QuickTime fail to clear browser memory, possibly allowing a malicious Java applet to capture whatever information is being stored.

Apple's update forces QuickTime to clear the memory before an untrusted applet can be run.

Windows users can download the update from Apple's support website. Mac users can get the update through the OS X Software Update component. 

JavaScript flaws were also at the root of Apple's last QuickTime update. That patch was issued just 11 days after an independent researcher discovered and wrote an exploit for a QuickTime flaw in under 12 hours.  

Late last year, a QuickTime flaw was used to launch a major phishing attack on MySpace.

Copyright ©v3.co.uk


Apple patches two QuickTime holes
 
 
 
Top Stories
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 285

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  60%
 
No
  40%
TOTAL VOTES: 105

Vote