Note: This page is part of the archive.

This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact if you have any questions about the US-CERT website archive.

Alert (SA06-256A)

Apple QuickTime Vulnerabilties

Systems Affected

Apple QuickTime for
  • Apple Mac OS X
  • Microsoft Windows


Apple has released Apple QuickTime 7.1.3 to correct several vulnerabilities. These vulnerabilities could allow an attacker to gain access to your computer.


Install an Update

OS X users should use the Mac OS X Software Update feature to download and install Apple QuickTime 7.1.3. Consider scheduling Software Update to check for updates automatically (this option is enabled by default).

Microsoft Windows users should upgrade to Apple QuickTime 7.1.3.


QuickTime prior to version 7.1.3 has multiple image and media file handling vulnerabilities that could allow an attacker to run malicious programs on your computer. This could happen by visiting a malicious web site. Upgrading to Apple QuickTime version 7.1.3 will correct these vulnerabilities.

Note that QuickTime ships with Apple iTunes.

For more technical information, see US-CERT Technical Alert TA06-256A and the Apple QuickTime Security Update.



Revision History

  • September 13, 2006: Initial release

Last updated

This product is provided subject to this Notification and this Privacy & Use policy.

Was this document helpful?  Yes  |  Somewhat  |  No