Note: This page is part of the archive.

This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact if you have any questions about the US-CERT website archive.

Alert (SA07-024A)

Apple QuickTime Update for RTSP Vulnerability

Systems Affected

Apple QuickTime on computers running
  • Apple Mac OS X
  • Microsoft Windows
Note that Apple iTunes and other software using the vulnerable QuickTime components are also affected.


A vulnerability exists in Apple QuickTime that could allow an attacker to gain control of your computer. Apple has released Security Update 2007-001 to address this vulnerability.


Install an update

Apple Mac OS X users should install Apple Security Update 2007-001 through Software Update.

Microsoft Windows users of QuickTime 7.1.3 should install Apple Security Update 2007-001 through Apple Software Update. Users of previous versions of QuickTime should upgrade to QuickTime 7.1.3 and then install Apple Software Update. You can find Apple Software Update in the Start menu under All Programs. If you cannot find Apple Software Update, then re-install QuickTime 7.1.3.

Refer to Apple Security Update 2007-001 for more information.


A vulnerability in Apple QuickTime 7.1.3, and possibly in earlier versions, allows an attacker to run malicious software on your computer when you open a QuickTime file. This malicious software could also be embedded in a web page, and could execute, without your knowledge, when you visit a malicious web page or open an HTML document. For information on protecting against these types of attacks consult Securing Your Web Browser.

For more technical information, see US-CERT Technical Alert TA07-005A.



Revision History

  • January 24, 2007: Initial release

This product is provided subject to this Notification and this Privacy & Use policy.

Was this document helpful?  Yes  |  Somewhat  |  No