Skip to main content

QuickTime and Firefox combine for insecurity

posted onSeptember 13, 2007
by hitbsecnews

A vulnerability in Apple Software's QuickTime media player can be exploited to execute remote javascript code, or by tapping into Firefox's chrome engine can execute remote code of any kind. This vulnerability has been described as being similiar to the QuickTime vulnerability that was behind the automated MySpace worm attack late last year.

The vulnerability involves a flaw in the way QuickTime loads its QTL format -- XML files which contain links to audio or video media and meta-data as if they were the actual file. Javascript can be inserted into attributes in the XML file which are automatically run when the file is opened. Since QuickTime allows these files to be used transparently where you would use media files, exploits may infect any audio or video format QuickTime can run, including mp3, mpg, avi and png. The blog post publishing the vulnerability has a list of 42 affected file extensions.

The flaw was discovered by a London security researcher Petko D. Petkovand posted on his blog gnucitizen. The same vulnerability had previously been divulged on the blog as early as December last year, but has not as yet been addressed. "So, I decided to post a demonstration of how a Low risk issue can be turned into a very easy to perform HIGH risk attack." Petkov wrote.

Source

Tags

Security

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th