Rixstep
 About | ACP | Buy | Industry Watch | Learning Curve | News | Search | Test
Home » Industry Watch

Apple Security: 'Please Hold - We're on iPhone!'

Leopard isn't the only thing moved to the back burner.


CUPERTINO (Rixstep) -- News of the Leopard push-back was one thing, but there are other far more serious matters also on hold at One Infinite Loop.

Zero day exploits.

Tom Ferris of Security Protocols reported two such zero day exploits against Apple's QuickTime in March 2006 and again in November of the same year. They've still not been fixed, reports Tom who now releases the details to the general public.

JVTCompEncodeFrame() Heap Overflow

'A heap overflow vulnerability exists within Apple Quicktime 7.1.5 and all prior versions when processing a malformed .mov file. When processing a malformed .mov file, the JVTCompEncodeFrame() function incorrectly parses the malformed data and causes the application to segmentation fault. This may allow for an attacker to cause the application to stop responding, and or to execute arbitrary code within the context of the logged in user.'

FlipFileTypeAtom_BtoN() Integer Overflow

'An integer overflow vulnerability exists within Apple Quicktime 7.1.5 and all prior versions when processing a malformed .MP4 file. When processing a malformed .MP4 file, the FlipFileTypeAtom_BtoN() function incorrectly parses the malformed data and causes the application to segmentation fault. This may allow for an attacker to cause the application to stop responding, and or to execute arbitrary code within the context of the logged in user.'

See Also
Security Protocols: Some Apple QuickTime Flaws

About | ACP | Buy | Industry Watch | Learning Curve | News | Products | Search | Substack
Copyright © Rixstep. All rights reserved.