Apple has been given some rare applause from the security community for tackling some critical vulnerabilities in its QuickTime media player.
A total of 17 flaws were patched by Apple, with several of them ranked as critical due to the fact that cyber criminals could have exploited them for remote code execution, according to a security advisory.
Apple had a large batch of external researchers to thank for finding the flaws, with the HP Zero Day Initiative uncovering the majority of them.
“A typical attack would embed such a file into a webpage and use social engineering to drive users into viewing the page. So far, there have been no reports of attackers exploiting this vulnerability yet,” Branco said.
“To put this into context, QuickTime is used by 61 percent of all internet enabled PCs, including 49 percent of all Windows PCs and 98 percent of all Apple computers… Even if you don’t use QuickTime by default to play movies and videos, it can be used as the media player for the PCT format on all web browsers, including Chrome, Safari, Internet Explorer and Firefox.
“All users, consumers and businesses alike, should download the security update as soon as possible since simply browsing to a malicious web page on any web browser can activate this vulnerability.”
Branco said Apple had been “very professional” in giving him consistent updates on the patch development process. “It was great to see a company of Apple’s size taking a proactive role to ensure that their software and their users are protected from major vulnerabilities like this one,” he added.
Apple took a bashing from a number of security professionals over its handling of the Flashback malware saga. After over 600,000 Macs were infected with the malicious software, Apple was criticised for taking too long to issue updates and not being regular enough with them.
Earlier this week, the iPhone maker released a patch giving Flashback cover to Leopard OS users, following criticism that the company had not given full protection to those running its older operating systems.
Following an update in February, it emerged last week that a version of FileVault in Mac OS X Lion stored passwords in a plain text file, meaning they were readable to any user with root or administrative access. That issue has now been fixed.
Are you a security pro? Test yourself with our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…