QuickTime suffers another RTSP flaw

QuickTime suffers another RTSP flaw
Yet another security flaw in how Apple's QuickTime software handles the Real Time Streaming Protocol (RTSP) has been revealed. If exploited by a malicious user, it is possible to run arbitrary code on a victim's computer. This flaw affects fully patched QuickTime version 7.3.1, running on Windows and possibly Mac OS X. It bares some resemblance to the QuickTime RTSP flaw reported in December.

Discovery of the latest flaw is credited to Luigi Auriemma, who has posted a concept exploit on his site. "For exploiting this vulnerability is only needed that an user follows a rtsp:// link, if the port 554 of the server is closed QuickTime will automatically change the transport and will try the HTTP protocol on port 80, the 404 error message of the server (other error numbers are valid too) will be visualized in the LCD-like screen," Auriemma wrote.



Source:
News.com


Written by: James Delahunty @ 11 Jan 2008 18:34
Advertisement - News comments available below the ad
  • 2 comments
  • tatsh

    glad I use Linux :)
    ffmpeg and VLC both render QuickTime fine it seems, even RTSP in Firefox with mozplugger/mplayer.

    11.1.2008 21:17 #1

  • borhan9

    I may really need to update my quicktime and itunes software.

    23.1.2008 17:04 #2

© 2024 AfterDawn Oy

Hosted by
Powered by UpCloud