Threat Level: green Handler on Duty: Daniel Wesemann

SANS ISC InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Quicktime patches up to 7.1.6

Published: 2007-05-02
Last Updated: 2007-05-02 01:07:22 UTC
by Joel Esler (Version: 1)
0 comment(s)
Thanks all for writing in, we've been patching ourselves.

Quicktime's update for the vulnerability discovered at CanSecWest came out today.  Yes, this is the now-infamous Java/Quicktime/Browser vulnerability that Dino Dai Zovi discovered during the "pwn-2-own" contest, that TippingPoint bought for 10,000 dollars for their Zero-Day initiative.  This was initially covered by Deb Hale back in this diary.

If you have been following the blog over at Matasano Chargen where Thomas Ptacek has been doing a great job covering it on the Matasano blog: http://www.matasano.com/log/
(This is one of those blogs that you should put in your rss reader if you have one)

Apple's writeup on this says:
  • QuickTime

    CVE-ID: CVE-2007-2175

    Available for: Mac OS X v10.3.9, Mac OS X v10.4.9, Windows XP SP2, Windows 2000 SP4

    Impact: Visiting a malicious website may lead to arbitrary code execution

    Description: An implementation issue exists in QuickTime for Java, which may allow reading or writing out of the bounds of the allocated heap. By enticing a user to visit a web page containing a maliciously-crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution. This update addresses the issue by performing additional bounds checking when creating QTPointerRef objects. Credit to Dino Dai Zovi working with TippingPoint and the Zero Day Initiative for reporting this issue.


Time to update!  12 days to put out an update for Apple.  Not too bad.
(Yes, I am an Apple Fanboy)

Joel Esler
http://handlers.sans.org/jesler
Keywords:
0 comment(s)
Diary Archives