Copyright 2024 - CSIM - Asian Institute of Technology

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Subject: US-CERT Technical Cyber Security Alert TA06-132B -- Apple QuickTime Vulnerabilities
From: CERT Advisory <This email address is being protected from spambots. You need JavaScript enabled to view it.>
Date: Fri, 12 May 2006 17:26:51 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                     National Cyber Alert System

               Technical Cyber Security Alert TA06-132B


Apple QuickTime Vulnerabilities

   Original release date: May 12, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

   Apple QuickTime on systems running

     * Apple Mac OS X
     * Microsoft Windows


Overview

   Apple QuickTime contains multiple vulnerabilities. Exploitation of
   these vulnerabilities could allow a remote attacker to execute
   arbitrary code or cause a denial-of-service condition.


I. Description

   Apple QuickTime 7.1 resolves multiple vulnerabilities in the way
   different types of image and media files are handled. An attacker
   could exploit these vulnerabilities by convincing a user to access
   a specially crafted image or media file with a vulnerable version
   of QuickTime. Since QuickTime configures most web browsers to
   handle QuickTime media files, an attacker could exploit these
   vulnerabilities using a web page.

   For more information, please refer to the Vulnerability Notes.


II. Impact

   The impacts of these vulnerabilities could allow an remote,
   unauthenticated attacker to execute arbitrary code or commands, and
   cause a denial-of-service condition. For further information,
   please see the Vulnerability Notes.


III. Solution

Upgrade

   Upgrade to QuickTime 7.1. This and other updates for Mac OS X are
   available via Apple Update.

Disable QuickTime in your web browser

   An attacker may be able to exploit this vulnerability by persuading
   a user to access a specially crafted file with a web
   browser. Disabling QuickTime in your web browser will defend
   against this attack vector.  For more information, refer to the
   Securing Your Web Browser document.


Appendix A. References

     * Vulnerability Notes for QuickTime 7.1 -
       <http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_7.1>
     
     * Securing Your Web Browser -
       <http://www.us-cert.gov/reading_room/securing_browser/>
     
     * About the security content of the QuickTime 7.1 Update -
       <http://docs.info.apple.com/article.html?artnum=303752>
     
     * Apple QuickTime 7.1 -
       <http://www.apple.com/support/downloads/quicktime71.html>
     
     * Standalone Apple QuickTime Player -
       <http://www.apple.com/quicktime/download/standalone.html>
     
     * Mac OS X: Updating your software -
       <http://docs.info.apple.com/article.html?artnum=106704>


 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-132B.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <This email address is being protected from spambots. You need JavaScript enabled to view it.> with "TA06-132B Feedback VU#289705" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2006 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   May 12, 2006: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRGT7JH0pj593lg50AQI2Uwf/U3zGDrR8UkWK4ry6AYMS7HPMdbiF6Vmo
9gP9Luc6Kj8zzxCWhnNKNzEq2P0B1oD03WcPFaIPnwvQJGApeUDRimyhQj8RDjME
yAUt/reWG7RZ0Z2w/qaiZP7pQ7SjyIUKkN2OCG8LMmGKqsiCdFXoss/Bu0yFMH11
uvgwibfvkOdRLAPmRTVWk+gJEAdw3xFySm9r92qmig6CxKi7GAIpi9Gf7MXcRsKg
oG3y5f06Kiq8ACYszPKneHE7WNvLP1ewuaWmf7PHiNebAB+W5hfwA2yEh6e6PSV2
eBi5cpigfXBrsjXk4L7wYrD8UcRl7nN8iqzWpMwYJkSloUmcYL1BBg==
=LsFu
-----END PGP SIGNATURE-----
Powered by: MHonArc

Login Form

Search

School of Engineering and technologies     Asian Institute of Technology