Yes, again.

From Secunia:

Description:
Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user’s system.

1) An unspecified error exists in the processing of H.264 movies. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted H.264 movie.

2) An unspecified error exists in the processing of movie files. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted movie file.

3) An integer overflow error exists in the handling of .m4v files and can be exploited to execute arbitrary code when a user accesses a specially crafted .m4v file.

4) An integer overflow error exists in the handling of the “author” and “title” fields when parsing SMIL files. This can be exploited to cause a heap-based buffer overflow and may allow execution of arbitrary code when a user opens a specially crafted SMIL file.

5) A design error exists in QuickTime for Java, which can be exploited to disable security checks and execute arbitrary code when a user visits a web site containing a specially crafted Java applet.

6) A design error exists in QuickTime for Java, which can be exploited to bypass security checks and read and write to process memory. This can lead to execution of arbitrary code when a user visits a web site containing a specially crafted Java applet.

7) A design error exists in QuickTime for Java due to JDirect exposing interfaces that may allow loading arbitrary libraries and freeing arbitrary memory. This can be exploited to execute arbitrary code when a user visits a web site containing a specially crafted Java applet.

8 ) A design error exists in QuickTime for Java, which can be exploited to capture the user’s screen content when a user visits a web site containing a specially crafted Java applet.

The vulnerabilities are reported in versions prior to 7.2.

Fix, update to version 7.2

Article Link

[tags]Apple Quicktime, Quicktime Vulnerability[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.