The QuickTime vulnerability leaves users open to attack via a web page embedded with a specially-crafted streaming media file.
The malformed file targets a flaw in the multimedia tool's Remote Transfer Streaming Protocol (RTSP) component.
An attacker could cause QuickTime to crash and remotely execute code on the target system. The flaw was reported on 11 January by security researcher Luigi Auriemma.
This is not the first time Apple has had to patch a vulnerability in QuickTime's RTSP code. Another flaw led to a series of attacks in December.
Apple has also issued an update for iPhoto, the image organising and sharing application which is a standard component of the iLife suite for OS X.
The flaw could allow an attacker to create a malformed Photocast stream which would allow remote code execution on the system of all users who attempted to subscribe. Discovery of the vulnerability is credited to security researcher Nathan McFeters.
Both security updates can be downloaded through Apple's Software Update utility or from the Apple Downloads site.
Apple patches QuickTime and iPhoto flaws
By
Shaun Nichols
on Feb 8, 2008 7:45AM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Channel can help lead customers to boosting workplace wellbeing with professional headsets

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers
Ingram Micro Ushers in the Age of Ultra

Tech For Good program gives purpose and strong business outcomes
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report