The QuickTime vulnerability leaves users open to attack via a web page embedded with a specially-crafted streaming media file.
The malformed file targets a flaw in the multimedia tool's Remote Transfer Streaming Protocol (RTSP) component.
An attacker could cause QuickTime to crash and remotely execute code on the target system. The flaw was reported on 11 January by security researcher Luigi Auriemma.
This is not the first time Apple has had to patch a vulnerability in QuickTime's RTSP code. Another flaw led to a series of attacks in December.
Apple has also issued an update for iPhoto, the image organising and sharing application which is a standard component of the iLife suite for OS X.
The flaw could allow an attacker to create a malformed Photocast stream which would allow remote code execution on the system of all users who attempted to subscribe. Discovery of the vulnerability is credited to security researcher Nathan McFeters.
Both security updates can be downloaded through Apple's Software Update utility or from the Apple Downloads site.
Apple patches QuickTime and iPhoto flaws
By
Shaun Nichols
on Feb 8, 2008 7:45AM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Empowering Sustainability: Schneider Electric's Dedication to Powering Customer Success
How mandatory climate reporting is raising the bar for corporate leadership
MSPs with a robust data protection strategy will achieve market success
Beyond the box: How Crayon Is Redefining Distribution for the Next Era
Guiding customers on the uneven path to AI adoption
Sponsored Whitepapers
Cut through the SASE confusion
Stay protected as cyber threats evolve
Defend Your Network from the Next Generation of AI Threats
The race to AI advantage is on. Don’t let slow consulting projects hold you back.
The changing face of Australian distribution




