On Monday, one week after Apple pushed out a security update for the popular media-playing program, resulting in 7.5.5, a fresh exploit was posted to the Milw0rm website.
According to Symantec's DeepSight service, the exploit can create a denial-of-service condition due to an error in the processing of the '<?quicktime type=?>' parameter when handling long strings.
The exploit also can crash iTunes or any program that uses a QuickTime plug-in, Mac security firm Intego said Thursday in a memo.
Based on the existing exploit code, the company rated the risk 'low'.
But Intego said the files containing the strings could handle an additional payload that would allow for the execution of arbitrary code 'with no user interaction, other than an attempt to view a file'.
In lieu of a fix, customers are encouraged to safely browse the web, DeepSight analyst Aaron Adams said in a journal entry. He recommended disabling third-party plug-ins and to run the browser with the least privileges possible.
An Apple spokeswoman did not immediately respond to a request for comment on Thursday.
See original article on scmagazineus.com
iTnews Benchmark Security Awards 2025
Digital Leadership Day Federal
Government Cyber Security Showcase Federal
Government Innovation Showcase Federal
Digital NSW 2025 Showcase



