No exploit for OS X…as of yet
Severity: Medium
26 November, 2007
Summary:
Over the long U.S. holiday weekend, a Polish security researcher publicly released exploit code for a zero-day vulnerability that affects Quicktime 7.3 and 7.2 for Windows. By enticing one of your users to a specially crafted web page, or tricking the user into opening a malicious Quicktime file, an attacker could exploit this flaw to execute code on that user’s computer, potentially gaining complete control of it. If you allow Quicktime or iTunes in your network (or suspect that users have installed them), have users either implement the workarounds described in this alert, or remove the applications until Apple releases a patch.
Exposure:
Last Friday, a security researcher named Krystian Kloskowski released Proof-of-Concept (PoC) code that exploits a zero day security vulnerability in the latest versions of Apple Quicktime (7.3 and 7.2) for Windows. The PoC exploits a new buffer overflow vulnerability involving the code that Quicktime uses to handle the Real Time Streaming Protocol (RTSP). This vulnerability is similar to another RTSP-related Quicktime flaw we described in January. By enticing one of your users into visiting a specially crafted web page or RTSP stream, or tricking them into opening a malicious Quicktime media file, an attacker could exploit this flaw to execute code on your user’s computer. A successful attacker inherits the privileges of the victim, so, depending upon what privileges you extend to your users, the attacker could potentially exploit this flaw to gain complete control of the victim computer.