Apple patches new 'deadly' for QuickTime
On January 23, Apple had to release a security update to fix an extremely dangerous error in the QuickTime application. The above security error is one of the achievements of the monthly Project of Apple security bugs. And Apple took 23 days to fix the problem.
The application developer said that this security error is related to how QuickTime handles RTSP (Real Time Streaming Protocol). If successfully exploiting this security error, hackers can gain control of the system that makes a mistake. The solution to exploit this error is to create a special RTSP string embedded in a QuickTime file and trick the user into opening the file.
Security companies such as Secunia and FrSIRT all classified this security error as extremely dangerous. However, security experts have confirmed that no malicious code is yet to be released that is distributed on the Internet.
However, one of the co-founders of the Apple Security Errors Project said that " 20 days is more than enough to produce a security exploit code that allows remote code execution. Real It has been shown that the code for exploiting this error appears ".
Apple said that only the version of QuickTime 7.1.3 for Mac OS X and Windows had RTSP security errors. Apart from the security error of QuickTime, there are still many other security errors that have not been fixed by Apple.
Users can visit here to download the QuickTime patch.
Hoang Dung
- Apple patches serious security in QuickTime
- Apple QuickTime RTSP buffer overflow
- QuickTime bug threatens XP, Vista
- QuickTime is turned into super-keylog
- Link download programs at apple.com
- QuickTime 'abetted' hackers to attack users
- 28% of software is not patched by security
- Apple blocked the fatal error for iTunes
- Apple patches the Safari version for Windows
- Apple fixes deadly errors in Safari
- Adode will issue monthly fixes
- The world's first yellow fleshed apple apple