QuickTime - Remote hacker manual control
| Version: | 7.2 and prior. | 
| Technical Details: | A Security Update for QuickTime 7.2 has been released to address the .qtl arbitrary code execution vulnerability publicly disclosed by pdp of gnucitizen. Specifically, a command injection opportunity exists within the qtnext field in QTL files that could allow it to pass arbitrary command line arguments when opened by a vulnerable application. The update addresses the way that QTL files handle URLs internally. | 
| Description: | Apple have released a Security Update for QuickTime 7.2 for Windows. This update addresses a publicly disclosed vulnerability that enables an attacker to potentially take control of a vulnerable system through the unique way that .qtl files handled and presented various content (demonstrated to affect XML content). | 
| Mitigation: | Update to the latest version of QuickTime, available from the Updates link below, or from the Software Update Application (OS X) | 
| Updates: | http://www.apple.com/quicktime | 
| Source: | http://docs.info.apple.com/article.html?artnum=61798 | 
| Exploits: | Numerous | 
| External Tracking Data: | CVE-ID: CVE-2007-4673 | 
Social bookmark this page

 Subscribe to our feed.
 Subscribe to our feed.