QuickTime 7.6.9 update resolves 15 vulnerabilities

Filed Under: Apple, Vulnerability

QuickTime download pageToday Apple announced the availability of QuickTime 7.6.9 for OS X 10.5 and Windows platforms. This release fixes 13 vulnerabilities in QuickTime for OS X Leopard and 15 vulnerabilities on the Windows platform. Keep in mind that if you use iTunes it requires that you install QuickTime as well, so be sure to check for updates.

Apple has provided a direct download link for IT folks at http://www.apple.com/quicktime/download/. All 13 vulnerabilities for OS X can cause unexpected application termination (what you and I call a crash, but you can't say crash on a Mac) or arbitrary code execution (make Quicktime run programs... BAD).

Strangely if you go to Apple's download page, as you can see in the image above, the iTunes bundle will still install an outdated version of QuickTime. The best method for updating QuickTime for OS X Leopard (10.5) computers is to click the fruit logo in the upper-left corner and choose Software Update. Windows users can choose Apple Software Update from the Start menu, or launch QuickTime and check for updates under the Help menu.
Apple Software Update screenshot

So if you run Windows or Leopard and install the updates you are now protected against these new flaws... What about Snow Leopard? Mum's the word so far, as QuickTime is integrated into OS X Snow Leopard and is not a separate component. I checked the last OS update from Apple and these CVEs are not patched, which leads me to believe Snow Leopard users are at risk from these flaws for now. Theoretically these CVEs could impact iPhone/iPad/iPod Touch users too, as QuickTime is a central piece of Apple's multimedia strategy.

If you are a Snow Leopard user, be cautious of AVIs, JPGs, MPG/MPEGs, MOVs and other content types of dubious origin. Unfortunately, this further demonstrates Apple's scattered security strategy: unannounced random updates for random platforms that leave windows of opportunity for those intent on compromising their devices. Everyone else should patch as soon as possible.

, , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Chester Wisniewski is a Senior Security Advisor at Sophos Canada. He provides advice and insight into the latest threats for security and IT professionals with the goal of providing clear guidance on complex topics. You can follow Chester on Twitter as @chetwisniewski, on App.net as Chester, Chester Wisniewski on Google Plus or send him an email at chesterw@sophos.com.