[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 421/05 - APPLE-SA-2005-05-31 - QuickTime 7.0.1



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 421/05 dated 01.06.05  Time: 14:30  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

APPLE-SA-2005-05-31 - QuickTime 7.0.1


Detail
====== 

Quartz Composer objects can be wrapped in a QuickTime
track, and can be delivered as a QuickTime movie.  With QuickTime
7.0, a Quartz Composer object can gather local data and send it via
an encoded URL to an arbitrary web location.  The QuickTime 7.0.1
update modifies the QuickTime Quartz Composer Plugin to prevent
access to remote web locations.




- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2005-05-31 QuickTime 7.0.1

QuickTime 7.0.1 is now available and delivers the following security
improvement for the Quartz Composer Plugin:

CVE-ID:  CAN-2005-1334

Available for:  QuickTime 7.0

Impact:  With QuickTime 7.0, a QuickTime movie containing a
maliciously crafted Quartz Composer object can leak a data to an
arbitrary web location.

Description:  Quartz Composer objects can be wrapped in a QuickTime
track, and can be delivered as a QuickTime movie.  With QuickTime
7.0, a Quartz Composer object can gather local data and send it via
an encoded URL to an arbitrary web location.  The QuickTime 7.0.1
update modifies the QuickTime Quartz Composer Plugin to prevent
access to remote web locations.  This issue does not occur in
QuickTime for Windows.  Credit to David Remahl of www.remahl.se/david
for reporting this issue.

QuickTime 7.0.1 is available at
http://www.apple.com/quicktime/download/mac.html
for QuickTime version 7

The download file is named:  "QuickTimeInstallerX.dmg"
Its SHA-1 digest is:  4aa63c334280e69aa0cf5256ee4b3afed1d45c65

Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQEVAwUBQpy9KYHaV5ucd/HdAQJxaAf/R8BKFFoN2nAXZzzRqNM1ZEFzE9E32WyF
E0RoM2gFIaz5VtyTxr28UODhmbFLbN3I2wq18NXIOx6XMzhiA7K+thqj7yeqILkC
jllxDmnuwrECSTDFZsJxU05tbD/xfvpbEDOoKNay741lGAVXDDwhjtZclWB44ZOr
MQc5ufeE2h07jfj1/DXw8eZKEkn8ctOZQxtPSCRiVReYZMzWS6Ixe+Xj9XHCZXaS
s6q2w6ecj01/DqfjeJMLUAiJAs2iB/KzAkoxUseenhh1wHLFqqYOdtksSRpTRtG+
E5MVdqeqt4DOyCF4Mz2SoYHl58DihDRU5DS5V4lljBuCU3ArW6fjZA==
=/7H3
- -----END PGP SIGNATURE-----


 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@xxxxxxxxxxxxxxx)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/security-announce/uniras-adv%40niscc.gov.uk

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Apple for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQp23fIpao72zK539AQEo3AP/fgS7KhFvsNtl1WWEGu9uFSnEDurT+dIq
9JNzfgk/FKfIL8YbdhmRCgtjxGuAY4ohpQ9wIKM8sl+9Bs9Zg6dgsNUt+6MMSvXL
VNpUQ6pg7tF+hSyvyGeCC9e5FQw+7dHpPCU2mA5JRcJ8+n9xS/bEOuxaFQmbKpay
/uRn1esWncc=
=78Y/
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________