This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Apple updates QuickTime to fix vulnerabilities

Share this article:

Apple has released QuickTime 7.6 that includes several enhancements and fixes seven critical security vulnerabilities.

 

The company has claimed that the vulnerabilities allowed system infiltration and the launch of code on the system using the privileges of the user. Problems were caused by errors in the processing of video files in different file formats and codecs For an attack to successful, a victim has to play a manipulated file that takes advantage of one of the vulnerabilities.

 

The security flaws resolved by the new release include vulnerabilities to maliciously crafted RTSP URLs and QTVR, AVI, MPEG-2, H.263, Cinepak and QuickTime-encoded movie files.

 

QuickTime 7.6 is available for Mac OS/X Tiger and Leopard as well as the Vole's Windows XP and Vista. It can be installed via Software Update or from the Apple Downloads page.

 

In a security update, US-CERT encouraged users to review Apple Article HT3403 and upgrade to QuickTime 7.6.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.