Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Highly Dangerous Flaw Discovered in QuickTime

A highly dangerous remote code execution flaw has been exposed in the recent version of the QuickTime for Windows. Secunia (A Danish vulnerability intelligence vendor) reported that the security hole could be exploited by the hackers to scam users into watching a maliciously designed Web page.

Security researcher, Krystian Kloskowski, said that the vulnerability originated owing to a boundary flaw in QuickTimeStreaming.qtx, when a string was constructed to inscribe to a debug log file, as reported by the Help Net Security on July 298, 2010.

To abuse the QuickTime vulnerability, an attacker should deceive users into visiting a malicious web page that refers to a specifically designed SMIL file including an unusually lengthy URL. SMIL is primarily an XML based markup language used to describe diverse aspects of multimedia presentations, like elements, timeline and layouts.

According to the security firm, if the error is effectively exploited, malicious code can be inserted by the hacker and the computer systems can be compromised.

These types of attacks are called the drive-by downloads, as the transmission of malicious data occurs visibly to the user. Cyber criminals are frequently infecting authentic websites by means of exploit toolkits that mainly target the same remote code execution flaws in obsolete versions of famous programs like Flash Player, Java Runtime, Firefox or Internet Explorer and Adobe Reader.

Commenting on cyber criminals selecting QuickTime as the attack vector, security experts said that QuickTime was an expensive target for criminals, as it was installed on a huge number of systems. Almost everybody who owned an iPhone, iPod or iPad, used iTunes and that required QuickTime for the purpose of audio and video playback.

As per the reports, the vulnerability is confirmed to affect only the recent version of the software (7.6.6) for Windows launched on March 30, 2010. Interestingly, the software was released to seal a total of 16 dangerous vulnerabilities. All of these vulnerabilities could be exploited by the attacker to inject and implement arbitrary code with the users' existing privileges.

Related article: Highly-Sensitive American Laboratory Attacked With phishing E-Mail

ยป SPAMfighter News - 8/10/2010

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page