Vulnerabilities / Threats
9/17/2008
02:27 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Zero-Day Exploit Code For Apple iTunes, QuickTime Posted

The vulnerability in Apple's newly patched software is said to crash any browser with the QuickTime plug-in.

A week after Apple updated its QuickTime software to version 7.5.5 and its iTunes software to version 8.0, a proof-of-concept exploit for a purported zero-day vulnerability in Apple's newly patched software has been posted at Milw0rm.com.

Someone using the name "Securfrog" has published code that supposedly can be used to crash any Web browser with the QuickTime plug-in. Because of the way QuickTime handles long strings of data, a memory heap overflow can be created.

Securfrog states that remote code execution may be possible as a consequence of this bug.

In an e-mail, Securfrog said that Apple was alerted a month ago but didn't respond, "so full disclosure."

A request to a security vendor to confirm the functionality of this code was not immediately answered.

Apple's QuickTime 7.5.5 patch fixed nine vulnerabilities related to problems with maliciously crafted media files. One, CVE-2008-3624, addresses a heap buffer overflow arising from the way QuickTime handles QuickTime Virtual Reality movie files.

On Monday, Apple issued Mac OS X 10.5.5, a patch for its operating system addressing more than 30 vulnerabilities in Apple and third-party software.

In "0-Day Patch Exposing Vendors (In)security Performance," presented in March at the Black Hat conference in Amsterdam, Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner of the Computer Engineering and Networks Laboratory at the Swiss Federal Institute of Technology found that, while Microsoft's handling of patches has been improving, Apple's response to security has been getting worse.

The researchers said that it seemed that "Apple's security processes and resources cannot cope with the side-effects of the increased popularity of their products."

Managing risk is the top security issue facing IT professionals, according to the 2008 InformationWeek Strategic Security Survey. The survey of 2,000 IT professionals also found that many are concerned with government or industry regulations that may not give adequate guidance on how to comply. You can learn more about the survey by downloading an InformationWeek Analytics report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.