Vulnerabilities / Threats
9/17/2008
02:27 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Zero-Day Exploit Code For Apple iTunes, QuickTime Posted

The vulnerability in Apple's newly patched software is said to crash any browser with the QuickTime plug-in.

A week after Apple updated its QuickTime software to version 7.5.5 and its iTunes software to version 8.0, a proof-of-concept exploit for a purported zero-day vulnerability in Apple's newly patched software has been posted at Milw0rm.com.

Someone using the name "Securfrog" has published code that supposedly can be used to crash any Web browser with the QuickTime plug-in. Because of the way QuickTime handles long strings of data, a memory heap overflow can be created.

Securfrog states that remote code execution may be possible as a consequence of this bug.

In an e-mail, Securfrog said that Apple was alerted a month ago but didn't respond, "so full disclosure."

A request to a security vendor to confirm the functionality of this code was not immediately answered.

Apple's QuickTime 7.5.5 patch fixed nine vulnerabilities related to problems with maliciously crafted media files. One, CVE-2008-3624, addresses a heap buffer overflow arising from the way QuickTime handles QuickTime Virtual Reality movie files.

On Monday, Apple issued Mac OS X 10.5.5, a patch for its operating system addressing more than 30 vulnerabilities in Apple and third-party software.

In "0-Day Patch Exposing Vendors (In)security Performance," presented in March at the Black Hat conference in Amsterdam, Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner of the Computer Engineering and Networks Laboratory at the Swiss Federal Institute of Technology found that, while Microsoft's handling of patches has been improving, Apple's response to security has been getting worse.

The researchers said that it seemed that "Apple's security processes and resources cannot cope with the side-effects of the increased popularity of their products."

Managing risk is the top security issue facing IT professionals, according to the 2008 InformationWeek Strategic Security Survey. The survey of 2,000 IT professionals also found that many are concerned with government or industry regulations that may not give adequate guidance on how to comply. You can learn more about the survey by downloading an InformationWeek Analytics report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I decided to treat the kiddos to a TV dinner tonight.
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.