QuickTime exploit disclosed for 1-week-old version

By
Follow google news

Just one week after Apple issues a new version of QuickTime, a fresh exploit has emerged.


It didn't take long for an exploit to emerge in Apple QuickTime version 7.5.5.

On Monday, one week after Apple pushed out a security update for the popular media-playing program, resulting in 7.5.5, a fresh exploit was posted to the Milw0rm website.

According to Symantec's DeepSight service, the exploit can create a denial-of-service condition due to an error in the processing of the '<?quicktime type=?>' parameter when handling long strings.

The exploit also can crash iTunes or any program that uses a QuickTime plug-in, Mac security firm Intego said Thursday in a memo.

Based on the existing exploit code, the company rated the risk 'low'.

But Intego said the files containing the strings could handle an additional payload that would allow for the execution of arbitrary code 'with no user interaction, other than an attempt to view a file'.

In lieu of a fix, customers are encouraged to safely browse the web, DeepSight analyst Aaron Adams said in a journal entry. He recommended disabling third-party plug-ins and to run the browser with the least privileges possible.

An Apple spokeswoman did not immediately respond to a request for comment on Thursday.

See original article on scmagazineus.com

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Supply chain attack hits 100 million-download Axios npm package

Supply chain attack hits 100 million-download Axios npm package

CBA onboards customers with NFC scans of ePassports

CBA onboards customers with NFC scans of ePassports

WA local gov entity lost $350,000 in phishing attack

WA local gov entity lost $350,000 in phishing attack

APRA pulls data submission system after security pentest

APRA pulls data submission system after security pentest

Log In

  |  Forgot your password?