[MacTUG] New QuickTime buffer vulnerability exposed

Marlon A. Griffith m3griffi at engmail.uwaterloo.ca
Tue Nov 27 16:22:17 EST 2007


The group has just issued a fresh advisory, which points out that a boundary error can be created when processing RTSP replies, simply by using an overly long "Content-Type" header. This in turn leads to a stack-based buffer overflow, which grants attackers the ability to launch arbitrary code. The vulnerability is only confirmed to work on QuickTime 7.3 at present, however, and requires victims to open a QTL file or visit a malicious website.

Secunia does caution that other versions of QuickTime may be exposed, and that the exploit is already out in public. Since Apple has yet to respond to the problem, QuickTime users are warned to avoid unfamiliar links and websites, and never open QTL files from untrusted sources.

http://www.macnn.com/articles/07/11/26/new.quicktime.flaw.exposed/


More information about the MacTUG mailing list