QuickTime zero-day attacks intercepted

Summary:Researchers at Symantec have intercepted two different in-the-wild malware attacks targeting an unpatched code execution vulnerability in Apple's QuickTime media player.

QuickTime zero-day under attack by malware authors
Researchers at Symantec have intercepted two different in-the-wild malware attacks targeting an unpatched code execution vulnerability in Apple's QuickTime media player.

Honeypots in Symantec's DeepSight Threat Management System captured the first known case of exploit exploitation of the flaw on December 1st, 2007.  The company has since confirmed that the attack -- which plants a malicious rootkit on Windows machines -- exploits a stack buffer overflow vulnerability in the way QuickTime handles the RTSP (Real Time Streaming Protocol) Content-Type header.

[ SEE: Apple QuickTime under siege ]

The flaw, publicly known since November 23,  dings Windows XP SP2 and Vista, as well as Mac OS X 10.4 (Tiger) and 10.5 (Leopard). Internet Explorer, Firefox, Opera, and Safari can all facilitate exploitation via Quicktime plug-ins or protocol association.

The skinny on the attacks, via Symantec DeepSight (Warning: beware of potentially malicious sites mentioned below):

One of the observed attacks is being hosted on, which resolves to both 2005-search.com and 1800-search.com. This host is running both a web server containing malicious script code, as well as a malicious RTSP server that carries out exploitation of the Apple QuickTime RTSP Response Header Remote Stack Based Buffer Overflow Vulnerability. Although exploitation is possible over any port, this RTSP server is using the default TCP port of 554.

The attack also appears to target the more common Windows MDAC and ANI vulnerabilities, observed in the wild on a regular basis.

The host, resolving from search-biz.org, has also been seen serving the attack. This host is responsible for carrying out exploitation of the well-known Windows ANI vulnerability. Victim users appear to be redirected to this server by the host, which resolves to ourvoyeur.net.  It appears that the ourvoyeur.net host is the root of this particular attack. It is possible that the domain was compromised and the embedded iframes referencing were injected by an attacker. It's likely that this URL is being distributed through online delivery mechanisms such as email, instant messages, and blog comment spam.

Successful exploitation executes an application called loader.exe, which is used as a backdoor to download a malicious rootkit and additional malware files.

Another attack is being hosted on the IP address This attack involves slightly more redirection and also involves IP addresses and

The discoveries come as researchers warn that QuickTime has emerged as a big target for vulnerability researchers and malicious hackers.   Not counting silent (undocumented) fixes, Apple has patched at least 32 security flaws affecting QuickTime in 2007.   Last year, the QuickTime patch count was 28.   Five were documented in 2005.

Topics: Mobility, Hardware, Security


Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.