QuickTime update patches Java flaw

Status
Not open for further replies.

nepcker

Proud Mac Pro Owner
By Peter Cohen

Apple on Tuesday offered QuickTime 7.1.6, an update to its core multimedia software for Mac OS X and Windows. Among the issues adjusted in this release is a fix for an exploit in QuickTime for Java that first came to light at a security conference two weeks ago.


QuickTime 7.1.6 addresses numerous bug fixes and includes support for Final Cut Studio 2, and timecode and closed captioning support in QuickTime Player. Apple recommends the update for all QuickTime 7 users. It is available for download from Apple’s Web site or from the Software Update system preference.


“An implementation issue exists in QuickTime for Java, which may allow reading or writing out of the bounds of the allocated heap. By enticing a user to visit a web page containing a maliciously-crafted Java applet, an attacker can trigger the issue which may lead to arbitrary code execution,” reads Apple’s technical note announcing the update. “This update addresses the issue by performing additional bounds checking when creating QTPointerRef objects. Credit to Dino Dai Zovi working with TippingPoint and the Zero Day Initiative for reporting this issue.”


The exploit with QuickTime for Java was first reported as a Mac OS X issue as it was the winner in a $10,000 price to break into a MacBook Pro set up at a recent security conference. It was later revealed as a cross-platform security flaw that affects Mac and Windows users alike. Security experts opined that it was inevitable the Mac would suffer such issues. The exploit’s discoverer, Dino Dai Zovi, said he’s been using Mac OS X from the start, though said in a recent interview that he felt Microsoft’s new Vista operating system was more secure than Mac OS X.



Source
 

aryayush

Aspiring Novelist
I was looking forward to this. John Gruber, in a recent post on his blog, had this to say:

David Maynor, regarding Friday’s CanSecWest Mac OS X exploit, writes:
Tom is right, brace your self for the flood of Mac faithfully [sic] posts about why this doesn’t count. I can hear John Gruber tapping away and silent sobbing in the distance…
In Maynor’s world, I called him on his bullshit regarding last summer’s MacBook Wi-Fi hack fiasco because I’m a member of the “Mac faithful”, a zealot who believes Macs are sprinkled with magic pixie dust that renders them invulnerable to security flaws, and who lashes out against anyone who claims otherwise.

In my world, I look for proof and evidence. Maynor and Ellch’s supposed MacBook Wi-Fi exploit? Still unproven. Dino Dai Zovi’s winning exploit in the CanSecWest contest? Proven. It’s that simple.

Nobody serious is downplaying this bug or claiming it doesn’t count. Of course it counts. It’s not the first such exploit against Mac OS X. It won’t be the last.

In Maynor’s world, Apple will issue legal threats against Dai Zovi; launch a scurrilous PR smear campaign against him simply for reporting a bug; claim the bug doesn’t actually exist; and then, months from now, fix it without giving him credit, claiming they found it themselves.

In my world, Dai Zovi won’t hear a word from Apple legal; Apple won’t say a single bad word about him in the press; and, weeks from now, when the bug is fixed in a security update, he’ll receive full credit for finding it.

Via Daring Fireball


Apple has done exactly what John Gruber predicted they would. Some people really are complete jackasses! LOL! :lol:
 
Status
Not open for further replies.
Top Bottom