Apple Applauded For QuickTime Patching

Apple has been given some rare applause from the security community for tackling some critical vulnerabilities in its QuickTime media player.

A total of 17 flaws were patched by Apple, with several of them ranked as critical due to the fact that cyber criminals could have exploited them for remote code execution, according to a security advisory.

Apple had a large batch of external researchers to thank for finding the flaws, with the HP Zero Day Initiative uncovering the majority of them.

Rare praise

Rodrigo Rubira Branco, from Qualys Vulnerability & Malware Research Labs, who discovered a memory corruption flaw in the software, praised Apple for working with him in patching the vulnerability. The threat could have meant that a user viewing a maliciously crafted .pict file in QuickTime could have been hit by “an unexpected application termination or arbitrary code execution”.

“A typical attack would embed such a file into a webpage and use social engineering to drive users into viewing the page. So far, there have been no reports of attackers exploiting this vulnerability yet,” Branco said.

“To put this into context, QuickTime is used by 61 percent of all internet enabled PCs, including 49 percent of all Windows PCs and 98 percent of all Apple computers… Even if you don’t use QuickTime by default to play movies and videos, it can be used as the media player for the PCT format on all web browsers, including Chrome, Safari, Internet Explorer and Firefox.

“All users, consumers and businesses alike, should download the security update as soon as possible since simply browsing to a malicious web page on any web browser can activate this vulnerability.”

Branco said Apple had been “very professional” in giving him consistent updates on the patch development process. “It was great to see a company of Apple’s size taking a proactive role to ensure that their software and their users are protected from major vulnerabilities like this one,” he added.

Apple took a bashing from a number of security professionals over its handling of the Flashback malware saga. After over 600,000 Macs were infected with the malicious software, Apple was criticised for taking too long to issue updates and not being regular enough with them.

Earlier this week, the iPhone maker released a patch giving Flashback cover to Leopard OS users, following criticism that the company had not given full protection to those running its older operating systems.

Following an update in February, it emerged last week that a version of FileVault in Mac OS X Lion stored passwords in a plain text file, meaning they were readable to any user with root or administrative access. That issue has now been fixed.

Are you a security pro? Test yourself with our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago