Apple QuickTime on systems running
- Apple Mac OS X
- Microsoft Windows
Apple QuickTime contains multiple vulnerabilities. Exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
Apple QuickTime 7.1 resolves multiple vulnerabilities in the way different types of image and media files are handled. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted image or media file with a vulnerable version of QuickTime. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page.
For more information, please refer to the Vulnerability Notes.
The impacts of these vulnerabilities could allow an remote, unauthenticated attacker to execute arbitrary code or commands, and cause a denial-of-service condition. For further information, please see the Vulnerability Notes.
Disable QuickTime in your web browser
An attacker may be able to exploit this vulnerability by persuading a user to access a specially crafted file with a web browser. Disabling QuickTime in your web browser will defend against this attack vector. For more information, refer to the Securing Your Web Browser document.
Appendix A. References
- Vulnerability Notes for QuickTime 7.1 - http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_7.1
- Securing Your Web Browser - http://www.us-cert.gov/reading_room/securing_browser/
- About the security content of the QuickTime 7.1 Update - http://docs.info.apple.com/article.html?artnum=303752
- Apple QuickTime 7.1 - http://www.apple.com/support/downloads/quicktime71.html
- Standalone Apple QuickTime Player - http://www.apple.com/quicktime/download/standalone.html
- Mac OS X: Updating your software - http://docs.info.apple.com/article.html?artnum=106704
Feedback can be directed to US-CERT.
May 12, 2006: Initial release
May 16, 2006: Fixed feedback link