Apple plugs 15 gaping security holes in QuickTime

Apple has shipped a new version of the QuickTime media player with patches for 15 security vulnerabilities affecting both Mac OS X and Windows users.

Apple has shipped a new version of the QuickTime media player with patches for 15 security vulnerabilities affecting both Mac OS X and Windows users.

The most serious of this batch of vulnerabilities could be exploited to launch remote code execution attacks via rigged image or movies files, Apple warned in an advisory.

QuickTime 7.6.9, available for Mac OS X (Leopard and Tiger) and Windows Windows 7, Vista, XP SP2 or later, is rated a "highly critical" update.

According to Apple, the flaws could be exploited via booby-trapped JP2 images, .avi files, movie files, MPEG-encoded files, FlashPix images, GIF images of PIC files.

follow Ryan Naraine on twitter

Here's a sample of some of the most serious flaws:

CVE-2010-3787: A heap buffer overflow exists in QuickTime's handling of JP2 images. Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking.

CVE-2010-3788: An uninitialized memory access issue exists in QuickTime's handling of JP2 images. Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of JP2 images.

CVE-2010-3789: A memory corruption issue is in QuickTime's handling of avi files. Viewing a maliciously crafted avi file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of avi files.

CVE-2010-3790: A memory corruption issue exists in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of movie files.

CVE-2010-3791: A buffer overflow exists in QuickTime's handling of MPEG encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking.

CVE-2010-3792: A signedness issue exists in QuickTime's handling of MPEG encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of MPEG encoded movie files.

CVE-2010-3793: A memory corruption issue exists in QuickTime's handling of Sorenson encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of Sorenson encoded movie files.

QuickTime 7.6.9 may be obtained from the Software Update application, or from the QuickTime Downloads site.