Focus on Apple
QuickTime exploited by media-handling flaw Nov 27 2007 10:59PM
Todd Woodward (todd_woodward symantec com) (1 replies)
"A Polish researcher published on Friday exploit code for a previously
unknown vulnerability in Apple's QuickTime media player, which can be
triggered by a call to a real-time streaming server..."

Read the rest here:

http://www.securityfocus.com/brief/633

Also see:

http://www.securityfocus.com/bid/26549

Security Response has the following Writeup:

Trojan.Quimkit is a proof-of-concept Trojan horse that exploits the
Apple QuickTime RTSP Response Header Remote Stack Based Buffer Overflow
Vulnerability.

http://www.symantec.com/business/security_response/writeup.jsp?docid=200

7-112605-2410-99

TinyURL: http://tinyurl.com/yo9gh2

###

Security Response Researcher
Focus-Apple Moderator

________________________________
Todd D. Woodward
Technical Support Engineer
NetBackup Support
Symantec Corporation
Springfield, Oregon
________________________________
Office: 541-335-7441

[ reply ]
RE: QuickTime exploited by media-handling flaw Nov 28 2007 05:12PM
Todd Woodward (todd_woodward symantec com) (1 replies)
RE: QuickTime exploited by media-handling flaw Nov 28 2007 05:27PM
Todd Woodward (todd_woodward symantec com)


 

Privacy Statement
Copyright 2010, SecurityFocus