Focus on Apple
QuickTime exploited by media-handling flaw Nov 27 2007 10:59PM
Todd Woodward (todd_woodward symantec com)
"A Polish researcher published on Friday exploit code for a previously
unknown vulnerability in Apple's QuickTime media player, which can be
triggered by a call to a real-time streaming server..."

Read the rest here:

Also see:

Security Response has the following Writeup:

Trojan.Quimkit is a proof-of-concept Trojan horse that exploits the
Apple QuickTime RTSP Response Header Remote Stack Based Buffer Overflow




Security Response Researcher
Focus-Apple Moderator

Todd D. Woodward
Technical Support Engineer
NetBackup Support
Symantec Corporation
Springfield, Oregon
Office: 541-335-7441

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus