123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Apple Issues Quicktime 7.7, Mitigates Multiple Security Vulnerabilities

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, Apple released QuickTime 7.7 to resolve several security issues. QuickTime is a multimedia framework, which allows users to add, edit, create and capture audio and video media, and is available for both Mac and Windows users. Out of the 14 vulnerabilities addressed in the latest update, 13 could cause unexpected termination of application or execution of arbitrary code and one could cause disclosure of video data. The vulnerabilities affect Mac OS X 10.5, Mac OS X 10.6, Windows 7, Vista, Windows XP Service Pack (SP) 2 and later. The security update resolves several stack or heap buffer overflow issues associated with handling of pict files, JPEG files, GIF images, H.264 encoded movie files, QTL files and STSC , STSS, STSZ, STTS atoms in QuickTime’s movie files. However, buffer overflow issues in GIF images, H.264 and QTL files do not affect Mac OS. The security update addresses multiple memory corruption issues in QuickTime’s handling of JPEG 2000 images and sample Tables in QuickTime movie files. The update also resolves integer overflow in handling of RIFF WAV files and audio channels. Viewing a malicious image ...
... or movie file may cause unexpected termination of application or allow execution of arbitrary code.

The latest version resolves a cross-origin issue in the handling of cross-site redirects, which may cause disclosure of video data from a different site on visiting a malicious website. The security issues addressed in the latest patch do not affect OS X Lion, the new operating system offered by Apple. Professionals associated with different organizations such as TippingPoint, Computer Emergency Response Team Coordination Center (CERT/CC) and Microsoft Vulnerability Research (MSVR) reported the vulnerabilities to Apple. The ever evolving malicious threats in the IT environment make it inevitable for IT professionals to improve their capabilities through iPad training and online university degree programs.

QuickTime users must immediately upgrade to the latest version by using the software update function in their system. Users intending to download QuickTime must do so by directly visiting the website of the developer. Adherence to security updates is crucial to protect applications and systems from malicious attacks. Attackers attempt to extract confidential data by installing malware. Users may keep themselves up-to-date on threats in the IT environment by following security blogs and enhance awareness through online degree programs.

Professionals qualified in computer science degree program may help developers in understanding the risks involved in the operating environment and evolve more secured technologies and products.

Total Views: 303Word Count: 407See All articles From Author

Add Comment

Computers Articles

1. How To Build A Peer-to-peer Marketplace?
Author: brainbell10

2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10

3. Everything You Need To Know About Web Development In 2026
Author: chetna

4. Create A Strong Online Presence Today
Author: FutureGenApps

5. User Experience Design
Author: brainbell10

6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10

7. The Thrilling World Of Geometry Dash Lite
Author: Hattie

8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas

9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas

10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC

11. Unreal Game Development
Author: brainbell10

12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp

13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management

14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify

15. Why Choose Sataware?
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: