Apple patches new 'deadly' for QuickTime

On January 23, Apple had to release a security update to fix an extremely dangerous error in the QuickTime application. The above security error is one of the achievements of the monthly Project of Apple security bugs. And Apple took 23 days to fix the problem.

The application developer said that this security error is related to how QuickTime handles RTSP (Real Time Streaming Protocol). If successfully exploiting this security error, hackers can gain control of the system that makes a mistake. The solution to exploit this error is to create a special RTSP string embedded in a QuickTime file and trick the user into opening the file.

Picture 1 of Apple patches new 'deadly' for QuickTime Security companies such as Secunia and FrSIRT all classified this security error as extremely dangerous. However, security experts have confirmed that no malicious code is yet to be released that is distributed on the Internet.

However, one of the co-founders of the Apple Security Errors Project said that " 20 days is more than enough to produce a security exploit code that allows remote code execution. Real It has been shown that the code for exploiting this error appears ".

Apple said that only the version of QuickTime 7.1.3 for Mac OS X and Windows had RTSP security errors. Apart from the security error of QuickTime, there are still many other security errors that have not been fixed by Apple.

Users can visit here to download the QuickTime patch.

Hoang Dung