U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.

TLP:WHITE

Alert (TA07-193A)

Apple Releases Security Updates for QuickTime

Original release date: July 12, 2007

Systems Affected

Apple QuickTime on systems running
  • Apple Mac OS X
  • Microsoft Windows

Overview

Apple QuickTime contains multiple vulnerabilities. Exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

Description

Apple QuickTime 7.2 resolves multiple vulnerabilities in the way Java applets and various types of media files are handled. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted Java applet or media file with a vulnerable version of QuickTime. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page.

Note that QuickTime ships with Apple iTunes.

For more information, please refer to the Vulnerability Notes Database.

Impact

These vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or commands and cause a denial-of-service condition. For further information, please see the Vulnerability Notes Database.

Solution

Upgrade QuickTime

Upgrade to QuickTime 7.2. This and other updates for Mac OS X are available via Apple Update.

On Microsoft Windows, QuickTime users can install the update by using the built-in auto-update mechanism, Apple Software Update, or by installing the update manually.

Disable QuickTime in your web browser

An attacker may be able to exploit some of these vulnerabilities by persuading a user to access a specially crafted media file with a web browser. Disabling QuickTime in your web browser may defend against this attack vector. For more information, refer to the Securing Your Web Browser document.

Disable Java in your web browser

An attacker may be able to exploit some of these vulnerabilities by persuading a user to access a specially crafted Java applet with a web browser. Disabling Java in your web browser may defend against this attack vector. Instructions for disabling Java can be found in the Securing Your Web Browser document.


References


Revision History

  • July 12, 2007: Initial release

This product is provided subject to this Notification and this Privacy & Use policy.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top