Apple fixes year-old QuickTime flaw
Takes second hack at Windows-only bug after researcher blows the whistle
The update fixes a flaw in QuickTime for Windows XP and Vista first reported in September 2006 by U.K. researcher Petko Petkov. Last month, Petkov posted proof-of-concept code for the vulnerability after claiming Apple had not acknowledged his messages. Several samples posted to the Web took advantage of both the QuickTime bug and one in the open-source Firefox browser to create a drive-by attack capable of invisibly hijacking a PC.
Mozilla Corp. patched Firefox six days later. Although Mozilla's chief of security, Window Snyder, admitted her group had overlooked the flaw when it crafted a July fix for a similar problem, she also took a shot at Apple. "This QuickTime issue appears to be the one described by CVE-2006-4965, but the fix Apple applied in QuickTime 7.1.5 does not prevent this version of the problem," Snyder said in September.
Apple disagreed with that assessment; today it pegged the vulnerability as a different bug by designating it CVE (Common Vulnerabilities and Exposure) 2007-4673. It did acknowledge the bug, however. "A command injection issue exists in QuickTime's handling of URLs in the 'qtnext' field in QTL files," read its advisory. "By enticing a user to open a specially crafted QTL file, an attacker may cause an application to be launched with controlled command line arguments, which may lead to arbitrary code execution."
According to Apple, the vulnerability does not exist in the Mac OS X version of QuickTime.
Apple first took a swing at the flaw in March, two months after researcher Avi Raff expanded on Petkov's work to create an exploit as part of January's "Month of Apple Bugs" project.
The patched QuickTime can be downloaded at Apple's Web site, or by using the optional Software Update utility packaged with the Windows versions of the player and Apple's iTunes music store. It is approximately 7MB in size and requires a restart of Windows.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts