The QuickTime vulnerability leaves users open to attack via a web page embedded with a specially-crafted streaming media file.
The malformed file targets a flaw in the multimedia tool's Remote Transfer Streaming Protocol (RTSP) component.
An attacker could cause QuickTime to crash and remotely execute code on the target system. The flaw was reported on 11 January by security researcher Luigi Auriemma.
This is not the first time Apple has had to patch a vulnerability in QuickTime's RTSP code. Another flaw led to a series of attacks in December.
Apple has also issued an update for iPhoto, the image organising and sharing application which is a standard component of the iLife suite for OS X.
The flaw could allow an attacker to create a malformed Photocast stream which would allow remote code execution on the system of all users who attempted to subscribe. Discovery of the vulnerability is credited to security researcher Nathan McFeters.
Both security updates can be downloaded through Apple's Software Update utility or from the Apple Downloads site.
Apple patches QuickTime and iPhoto flaws
By
Shaun Nichols
on Feb 8, 2008 7:45AM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
New Microsoft CSP rules? Here’s how MSPs can stay ahead with Ingram Micro
Promoted Content
Why Renew IT Is Different: Where Science, AI and Sustainability Redefine IT Asset Disposition
Beyond the box: How Crayon Is Redefining Distribution for the Next Era
Think Technology Australia deliver massive ROI to a Toyota dealership through SharePoint-powered, automated document management
Shared Intelligence is the Real Competitive Edge Partners Enjoy with Crayon




