Apple QuickTime Vulnerability Threatens Firefox, iTunes - InformationWeek
Software // Information Management
02:10 PM
Connect Directly
[Dark Reading Crash Course] Finding & Fixing Application Security Vulnerabilitie
Sep 14, 2017
Hear from a top applications security expert as he discusses key practices for scanning and securi ...Read More>>

Apple QuickTime Vulnerability Threatens Firefox, iTunes

The exploit requires that the victim is duped into clicking on a Web link in an e-mail message or on a Web page that points to what appears to be a media file.

Over the weekend, Polish security researcher Krystian Kloskowski discovered vulnerability in Apple's QuickTime media player that could allow an attacker to execute malicious code on affected systems.

"Apple QuickTime contains a stack buffer overflow vulnerability in the way QuickTime handles the RTSP Content-Type header," warns U.S. CERT in a security advisory published on Saturday. "This vulnerability may be exploited by convincing a user to connect to a specially crafted RTSP stream. Note that QuickTime is a component of Apple iTunes, therefore iTunes installations are also affected by this vulnerability."

Symantec security researcher Elia Florio reports that proof of concept exploit code has been made available and that no patch exists for the flaw at this time. He recommends that network administrators restrict outbound connections on TCP 554 using their firewalls and to urge users not to follow links to untrusted Web sites.

U.S. CERT cautions that "RTSP...may use a variety of port numbers, so blocking the protocol based on a particular port may not be sufficient."

Secunia rates the exploit "extremely critical."

The exploit has been tested on Windows Vista and Windows Pro XP 2 using QuickTime 7.2 and 7.3. Mac OS X users are also vulnerable, according to a Symantec spokesperson.

The exploit requires that the victim is duped into clicking on a Web link in an e-mail message or on a Web page that points to what appears to be a media file. In fact, the file is an XML file that makes the QuickTime player open an RTSP connection on port 554 to the malicious server hosting the exploit file. In so doing, the QuickTime player receives a malformed RTSP message that creates a buffer overflow error and allows malicious code to execute.

Florio says that the attack doesn't appear to work on Internet Explorer 6/7 and Safari 3 Beta users, but points out that Firefox users are vulnerable.

"Firefox users are more susceptible to this attack because Firefox farms off the request directly to the QuickTime Player as a separate process outside of its control," says Florio. "As a result, the current version of the exploit works perfectly against Firefox if users have chosen QuickTime as the default player for multimedia formats."

Florio also warns that this attack may work with other media file formats such as mpeg, .avi, and other MIME types that may be associated with the QuickTime player.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll