NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Possible Cross-Platform 0Day in Apple's Quicktime Music Player
Apple's Quicktime music player in combination with Safari has been identified as the attack vector that won last week's $10,000 prize at the CanSecWest security conference in Vancouver. But it turns out that the vulnerability not only extends to other OSX browsers but also possibly to Windows and PPC Macs as well. Updated: Possible Exploit Released. Fix released on May 1st. See below.No Longer Supported
The Quicktime bug seems to be passed to it by a Java capable web browser using the Quicktime for Java interface (QT4J). Any web browser that supports Java will become a vulnerability vector if Quicktime is installed. If Java support is disabled in the browser it can no longer be used for an attack.

Currently Safari and Firefox are confirmed vectors on the MacIntel OSX platform. Currently it is known that Windows Quicktime is vulnerable as well. What is not known is to what degree. If the attack is a buffer overflow an actual "exploiting the box" type attack may be OS specific. In other words Quicktime under Windows may simply crash or hang the computer if the same exploit code is used. Converting a buffer overflow in to a full fledged exploit takes time and is not always possible. But they did it on the OSX platform so it is entirely possible that someone can do it on the Windows platform as well. However, if the exploit simply takes advantage of a function built-in to Quicktime than the current exploit may work on both platforms.

Details are still emerging and part of the contest rules gives 3COM (parent company of TippingPoint's Zero Day Initiative) control over what information is released. This will limit malicious use of the bug until someone else figures it out, or until the information leaks out. Either way there is probably a little time available to allow TippingPoint to update their firewall product and Apple to fix the problem.

The exploit requires that the user visit a malicious web page, either by chance or by clicking on a malicious link.

Mitigation:
  • Turn off Java support in your browser
  • Uninstall Quicktime
  • If you use Firefox use the NoScript plugin to disallow Java on a site by site basis. There is some confusion on how to turn "Java" in the NoScript plugin. This screen shot should help. Please keep in mind that Java and JavaScript are not the same thing. This problem involves "Java". If you use Firefox you can download the latest version of NoScript at NoScript.net
  • Apple Released a Fix to this on May 1st, QuickTime version 7.1.6


Discovery credit goes to Dino Di Zovie. "Think of it as a problem that can be triggered only if Java is enabled." said Thomas Ptacek on the group's Matasano blog.

More information as it becomes available.

UPDATES:
  • 4/25 PM: Matasano Security's Thomas Ptacek is quoting "multiple credible sources" that the entire contest took place over an unsecure wireless network. Why is that important? Because in a room full of hackers some of them were surely sniffing (monitoring) the whole thing. There are unconfirmed reports that someone in that room has recreated the exploit and is releasing it in to the wild. The contest organizers are disputing this saying that the wireless access point was only used to route traffic out to the internet and that the Macbooks involved were on a wired connection. But that doesn't mean that an exploit wasn't reverse engineered by other means. So if you haven't taken measures to protect your computers yet now is the time.
  • 4/25 PM: Secunia has released Secunia Advisory #SA25011 rated as "Highly Critical". The advisory states that the vulnerability affects Apple Quicktime versions 3.x through 7.x



Share or Bookmark this Article Using:
| furl | reddit | del.icio.us | magnoliacom | digg | newsvine | stumble it |



Google
WebNIST.org
NIST.govSecurityFocus.com






Posted by NIST.org on Wednesday 25 April 2007 - 16:11:18 | |printer friendly
Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2000-0368 (ios)
Classic Cisco IOS 9.1 and later allows attackers with access to the login prompt to obtain portions ...
»CVE-2004-0678 (chat_server)
Cross-site scripting (XSS) in one2planet.infolet.InfoServlet in 12Planet Chat Server 2.9 allows remo ...
»CVE-2011-3925 (chrome)
Use-after-free vulnerability in the Safe Browsing feature in Google Chrome before 16.0.912.75 allows ...
»CVE-2011-3927 (chrome)
Skia, as used in Google Chrome before 16.0.912.77, does not perform all required initialization of v ...
»CVE-2012-2520 (groove_server, infopath, lync, office_communicator, office_web_apps, sharepoint_foundation, sharepoint_server, sharepoint_services)
Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Commun ...
»CVE-2012-2521 (internet_explorer)
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows rem ...
»CVE-2012-2522 (internet_explorer)
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows rem ...
»CVE-2012-2523 (internet_explorer, jscript, vbscript)
Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit pla ...
»CVE-2012-2524 (office)
Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote attackers to execute arbitrary code or ...
»CVE-2012-2526 (windows_xp)
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly proce ...
»CVE-2012-2527 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 an ...
»CVE-2012-2528 (office_compatibility_pack, office_web_apps, word, word_automation_services, word_viewer)
Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer ...
»CVE-2012-2529 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Integer overflow in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows ...
»CVE-2012-2530 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 an ...
»CVE-2012-2531 (iis)
Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, whi ...


Date published: 2016-09-24T04:50:09Z
Details

»OpenSSL Releases Security Updates
Original release date: September 23, 2016 OpenSSL has released security updates to address vu ...
»FTC Releases Data Breach Recovery and Prevention Video
Original release date: September 22, 2016 The Federal Trade Commission (FTC) has released a s ...
»Drupal Releases Security Advisory
Original release date: September 21, 2016 Drupal has released an advisory to address vulnerab ...
»Cisco Releases Security Updates
Original release date: September 21, 2016 Cisco has released security updates to address vuln ...
»Mozilla Releases Security Updates
Original release date: September 20, 2016 Mozilla has released security updates to address mu ...
»Apple Releases Security Updates
Original release date: September 20, 2016 Apple has released security updates to address vuln ...
»Cisco Releases Security Updates
Original release date: September 16, 2016 Cisco has released security updates to address a vu ...
»VMWare Releases Security Updates
Original release date: September 16, 2016 VMware has released a security update to address vu ...
»Cisco Releases Security Updates
Original release date: September 15, 2016 Cisco has released security updates to address vuln ...
»Google Releases Security Update for Chrome
Original release date: September 14, 2016 Google has released Chrome version 53.0.2785.113 to ...


Date published: not known
Details

»Throwback Thursday: Following the Breadcrumbs
In 1999, Christine Orshesky described how one large organization de ...
»VB2016 preview: Cryptography mistakes in malware
At VB2016, two talks will discuss mistakes made by malware authors ...
»GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016
Next month at VB2016, HPE Security's Oleg Petrovsky will speak abou ...
»BSides Denver: Join and Support the Security Community
If you are coming to VB2016 in Denver, why not spend an extra day i ...
»VB2016 'Last-Minute' Papers Announced
We are excited to announce the addition of the "last-minute ...
»VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka
In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi T ...
»Paper: Behavioural Detection and Prevention of Malware on OS X
In a new paper published through Virus Bulletin, Vincent Van Mieghe ...
»VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!
At VB2016, four researcher from Bitdefender will present a paper in ...
»VB2016 preview: Uncovering the Secrets of Malvertising
Malvertising, in which legitimate ad networks are abused to silentl ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» OpenSSL Releases Security Updates
[23 Sep 2016 01:13pm]

» FTC Releases Data Breach Recovery and Prevention Video
[22 Sep 2016 11:21am]

» Drupal Releases Security Advisory
[21 Sep 2016 06:49pm]

» Cisco Releases Security Updates
[21 Sep 2016 06:36pm]

» Mozilla Releases Security Updates
[20 Sep 2016 03:02pm]

» Apple Releases Security Updates
[20 Sep 2016 01:56pm]

» Cisco Releases Security Updates
[16 Sep 2016 07:31pm]

» VMWare Releases Security Updates
[16 Sep 2016 02:17am]

» Cisco Releases Security Updates
[15 Sep 2016 03:46am]

» Google Releases Security Update for Chrome
[14 Sep 2016 05:14am]

***
US-CERT Alerts

» TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
[06 Sep 2016 04:29pm]

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

***
Computerworld Security

» Companies say IoT matters but vary on how to secure it
[23 Sep 2016 06:34pm]

» What you should know, and do, about the Yahoo breach
[23 Sep 2016 11:26am]

» Privacy groups call for FTC probe of WhatsApp promises
[23 Sep 2016 09:25am]

» Vint Cerf's dream do-over: 2 ways he'd make the internet different
[23 Sep 2016 05:17am]

» How the Yahoo breach affects you
[23 Sep 2016 04:43am]

» Yahoo uncovered breach after probing a black market sale
[23 Sep 2016 04:36am]

» Hackers got a treasure trove of data from the Yahoo breach
[22 Sep 2016 06:33pm]

» Verizon learned of massive Yahoo data breach just two days ago
[22 Sep 2016 03:01pm]

» Massive Yahoo hack is the world's biggest -- for now
[22 Sep 2016 02:36pm]

» Yahoo data breach affects at least half a billion users
[22 Sep 2016 01:31pm]

» IDG Contributor Network: The changing data protection paradigm
[22 Sep 2016 01:15pm]

» Site that leaked Colin Powell's emails dumps First Lady's passport
[22 Sep 2016 01:06pm]

» Impending cumulative updates unnerve Windows patch experts
[22 Sep 2016 12:56pm]

» Yahoo reportedly to confirm massive data breach
[22 Sep 2016 09:44am]

» New legislation seeks to prevent U.S. voting systems from being hacked
[21 Sep 2016 03:24pm]

***
Microsoft Security Advisories

» 3181759 - Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege - Version: 1.0
[13 Sep 2016 11:00am]

» 3174644 - Updated Support for Diffie-Hellman Key Exchange - Version: 1.0
[13 Sep 2016 11:00am]

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

***
WIRED

» Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes
[24 Sep 2016 05:00am]

» Our Favorite Hacker Moments From Mr. Robot Season 2
[22 Sep 2016 12:18pm]

» Hack Brief: Yahoo Breach Hits Half a Billion Users
[22 Sep 2016 10:15am]

» Officials Are Scrambling to Protect the Election From Hackers
[21 Sep 2016 05:00am]

» Cloudflare Launches a Three-Pronged Attack to Encrypt the Entire Web
[20 Sep 2016 07:43am]

» How Police Trace Cellphones in IEDs Like the Ones in NYC
[19 Sep 2016 01:56pm]

» Inside Google’s Internet Justice League and Its AI-Powered War on Trolls
[19 Sep 2016 04:55am]

» Security News This Week: Congress Celebrates the Snowden Movie by Slamming Snowden
[17 Sep 2016 05:00am]

» U.K. Judge OKs Extradition to the U.S. for Hacktivist Lauri Love
[16 Sep 2016 09:07am]

» How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone
[15 Sep 2016 01:51pm]

***
Network World Security

» Cisco, IBM may be interested in buying Imperva
[23 Sep 2016 04:08pm]

» The next target for phishing and fraud: ChatOps
[23 Sep 2016 12:21pm]

» NY regulation aims to raise bank security standards
[23 Sep 2016 12:07pm]

» Largest DDoS attack ever delivered by botnet of hijacked IoT devices
[23 Sep 2016 11:53am]

» Open source routers deliver low cost, flexibility
[12 Sep 2016 04:00am]

» Review: 5 open source alternatives for routers/firewalls
[12 Sep 2016 04:00am]

» Review: SentinelOne blocks and dissects threats
[31 Aug 2016 05:40am]

» Review: Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» 10 advanced endpoint protection tools
[05 Jul 2016 04:00am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» NY regulation aims to raise bank security standards
[23 Sep 2016 12:07pm]

» Largest DDoS attack ever delivered by botnet of hijacked IoT devices
[23 Sep 2016 11:53am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}