
Heads up.
From Information Week:
An Italian security researcher has posted a proof-of-concept exploit for a zero-day vulnerability in the most current version of Apple’s QuickTime media software (7.3.1).
Luigi Auriemma, noted among other things for discovering a vulnerability in the Unreal Engine in 2004, on Thursday posted details about producing a buffer overflow error in QuickTime. Buffer overflows can often be exploited by attackers to compromise the affected system.
“The bug is a buffer-overflow and the return address can be fully overwritten so a malicious attacker could use it for executing malicious code on the victim,” Auriemma said in an e-mail.
The vulnerability affects both Windows and Mac OS X versions of Apple’s QuickTime software.
In his description of the exploit, Auriemma explains that when QuickTime encounters a Real-Time Streaming Protocol link (rtsp://) link and port 554 of the server is closed, the application will switch to the HTTP protocol on port 80. The server then sends a long HTTP error message, so long that it causes the buffer to overflow. This allows the attacker to take control the affected system.
From milw0rm, the exploit.
[tags]Zero Day, QuickTime Exploit, PoC Exploit, Vulnerability[/tags]