Apple releases seven QuickTime fixes

Apple has patched seven vulnerabilities in the latest version of QuickTime affecting the Windows and MacOS X versions of the media player software. Each of the vulnerabilities affects users of MacOS 10.3.9, 10.4.9 and 10.5 as well as Windows XP and Vista. Six of the vulnerabilities could allow attackers to remotely execute code on the targeted machine.

View: The full story @ vnunet

Report a problem with article
Previous Story

Sony CEO: format war in 'stalemate'

Next Story

Gphone vs. iPhone: The security debate begins

10 Comments

Commenting is disabled on this article.

Don't think so, since it appears this article is talking *about* 7.3, the recent update, not an update *to* 7.3. There is nothing later than 7.3 on the site, and the Apple updater doesn't find any either.

Or maybe the update has been pulled by now, but more likely there never was one.

Didn't take them to long to patch their issues, which is cool. Not that I'm a Quicktime fan at all, but saw these alerts on secunia.com a few days ago.

As much as I've moaned historically about the use of the phrase 'old news', in the context of your comment, this *is* old news - the new version of quicktime was released early in the week - the actual source for the secunia vulns was as part of a 'responsible disclosure', meaning patch + vuln info released at the same time.

It was covered in the software news, but as is usual for Apple, the update summary posted (admitedly that could have been the fault of the news poster on neowin) didn't even mention the word security, let alone 'highly critical'. Very poor!

Jon said,
As much as I've moaned historically about the use of the phrase 'old news', in the context of your comment, this *is* old news - the new version of quicktime was released early in the week - the actual source for the secunia vulns was as part of a 'responsible disclosure', meaning patch + vuln info released at the same time.

It was covered in the software news, but as is usual for Apple, the update summary posted (admitedly that could have been the fault of the news poster on neowin) didn't even mention the word security, let alone 'highly critical'. Very poor!

I was the news poster on neowin software news (somehow) but my original post has been changed and the link to
update summary has been deleted by the Newsdesk So... maybe you should ask them why ?