

- #QUICKTIME 7.7 WOMDPWS FOR MAC OS X#
- #QUICKTIME 7.7 WOMDPWS MOVIE#
- #QUICKTIME 7.7 WOMDPWS MP4#
- #QUICKTIME 7.7 WOMDPWS CODE#
#QUICKTIME 7.7 WOMDPWS FOR MAC OS X#
For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-001. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.3.
#QUICKTIME 7.7 WOMDPWS CODE#
Impact: Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution - Description: A buffer overflow existed in the handling of PNG files.CVE-2012-0666 : CHkr_D591 working with HP's Zero Day Initiative Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution - Description: A stack buffer overflow existed in the QuickTime plugin's handling of QTMovie objects.CVE-2012-0659 : An anonymous researcher working with HP's Zero Day Initiative For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-002.

For OS X Lion systems, this issue is addressed in OS X Lion v10.7.4. Impact: Viewing a maliciously crafted MPEG file may lead to an unexpected application termination or arbitrary code execution - Description: An integer overflow existed in the handling of MPEG files.CVE-2012-0658 : Luigi Auriemma working with HP's Zero Day Initiative

#QUICKTIME 7.7 WOMDPWS MOVIE#
Impact: Viewing a maliciously crafted movie file during progressive download may lead to an unexpected application termination or arbitrary code execution - Description: A buffer overflow existed in the handling of audio sample tables.CVE-2011-3459 : Luigi Auriemma working with HP's Zero Day Initiative

#QUICKTIME 7.7 WOMDPWS MP4#
Impact: Opening a maliciously crafted MP4 encoded file may lead to an unexpected application termination or arbitrary code execution - Description: An uninitialized memory access issue existed in the handling of MP4 encoded files.CVE-2012-0665 : Luigi Auriemma working with HP's Zero Day Initiative Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution - Description: A heap buffer overflow existed in the handling of H.264 encoded movie files.CVE-2012-0664 : Alexander Gavrun working with HP's Zero Day Initiative Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution - Description: A heap overflow existed in QuickTime's handling of text tracks.CVE-2012-0663 : Alexander Gavrun working with HP's Zero Day Initiative Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution - Description: Multiple stack overflows existed in QuickTime's handling of TeXML files.Here are the 17 security vulnerabilities fixed in this release: You can download the new version directly from here: QuickTimeInstaller. The new version fixes 17 security vulnerabilities in the multimedia framework. Apple today released QuickTime 7.7.2 for Windows XP SP2, Windows Vista, Windows 7, and later.
