Apple plugs eight more QuickTime holes

Summary:Apple today shipped its fifth QuickTime security update for 2007, patching at least eight vulnerabilities that could cause code execution attacks on Mac OS X, Windows XP and Windows Vista systems.

Apple plugs eight more QuickTime holes
Apple today shipped its fifth QuickTime security update for 2007, patching at least eight vulnerabilities that could cause code execution attacks on Mac OS X, Windows XP and Windows Vista systems.

The skinny, according to this Cupertino alert:

CVE-2007-2295 -- A memory corruption issue exists in QuickTime's handling of H.264 movies. By enticing a user to access a maliciously crafted H.264 movie, an attacker can trigger the issue which may lead to an unexpected application termination or arbitrary code execution. (Available for Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2).

CVE-2007-2392 -- A memory corruption issue exists in QuickTime's handling of movie files. By enticing a user to access a maliciously crafted movie file, an attacker can trigger the issue which may lead to an unexpected application termination or arbitrary code execution. (Available for Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2).

CVE-2007-2296 -- An integer overflow vulnerability exists in QuickTime's handling of .m4v files. By enticing a user to access a maliciously crafted .m4v file, an attacker can trigger the issue which may lead to an unexpected application termination or arbitrary code execution. (Available for Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2).

CVE-2007-2394 -- An integer overflow vulnerability exists in QuickTime's handling of SMIL files. By enticing a user to access a maliciously crafted SMIL file, an attacker can trigger the issue which may lead to an unexpected application termination or arbitrary code execution. (Available for Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2)

[ SEE: Safari on Windows could be big target for malware ]

CVE-2007-2397 -- A design issue exists in QuickTime for Java, which may allow security checks to be disabled. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution. (Available for Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2).

CVE-2007-2393 -- A design issue exists in QuickTime for Java. This may allow Java applets to bypass security checks in order to read and write process memory. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution. (Available for Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2).

[ SEE: Securing Safari: How to run Apple's Web browser securely ]

CVE-2007-2396 -- A design issue exists in QuickTime for Java. JDirect exposes interfaces that may allow loading arbitrary libraries and freeing arbitrary memory. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution. (Available for: Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2).

CVE-2007-2402 -- A design issue exists in QuickTime for Java, which may allow a malicious website to capture a client's screen content. By enticing a user to visit a web page containing a maliciously crafted Java applet, an attacker can trigger the issue which may lead to the disclosure of sensitive information. (Available for Mac OS X v10.3.9, Mac OS X v10.4.9 or later, Windows Vista, XP SP2).

Topics: Operating Systems, Apple, Hardware, Microsoft, Open Source, Windows

About

Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.