November 24, 2014

In brief: Apple releases QuickTime 7.7.3 for Windows 7, Vista, XP SP2 or later

(LiveHacking.Com) – Apple has released an update to its popular QuickTime video player to address several vulnerabilites that existed when viewing a maliciously crafted file for a variery of different file types.

The full list of fixes is as follows:

  • Viewing a maliciously crafted PICT file may lead to an unexpected application termination or arbitrary code executin.  A buffer overflow existed in the handling of REGION
  • records in PICT files along with a memory corruption issue that existed in the handling of PICT files.These issue were addressed through improved bounds checking.
  • Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.  A use after free issue existed in the QuickTime plugin’s handling of ‘_qtactivex_’ parameters within a HTML object element. This issue was addressed through improved memory handling.
  • Viewing a maliciously crafted QuickTime TeXML file may lead to an unexpected application termination or arbitrary code execution. A buffer overflow existed in the handling of the
  • transform attribute in text3GTrack elements. This issue was addressed through improved bounds checking.
  • Viewing a maliciously crafted QuickTime TeXML file may lead to an unexpected application termination or arbitrary code execution.  Multiple buffer overflows existed in the handling of
  • style elements in QuickTime TeXML files. These issues were addressed through improved bounds checking.
  • Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.  A buffer overflow existed in the QuickTime plugin’s handling of MIME types. This issue was addressed through improved bounds checking.
  • Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. A use after free issue existed in the QuickTime ActiveX control’s handling of the Clear() method. This issue was addressed through improved memory management.
  • Viewing a maliciously crafted Targa file may lead to an unexpected application termination or arbitrary code execution.  A buffer overflow existed in the handling of Targa image files. This issue was addressed through improved bounds checking.
  • Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. A buffer overflow existed in the handling of ‘rnet’ boxes in MP4 files. This issue was addressed through improved bounds checking.

QuickTime 7.7.3 may be downloaded from the QuickTime site: http://www.apple.com/quicktime/download/. Also more information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222.