Dec 8, 2010 07:31 GMT  ·  By

Apple has released version 7.6.9 of its QuicktTime player as a security update, addressing critical vulnerabilities that can potentially be exploited to execute arbitrary code.

Most of the security issues apply to QuickTime 7 on Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista and XP SP2 or later, but there are also two Windows-only flaws.

A number of fifteen vulnerabilities were patched in total, most of which can be exploited by tricking users into opening maliciously crafted image or movie files.

Two memory issues, CVE-2010-3787 and CVE-2010-3788, can be triggered via malformed JP2 (JPEG 2000) images and lead to unexpected application termination with the possibility of code execution.

Another three flaws, CVE-2010-3794, CVE-2010-3795 and CVE-2010-3801, can be exploited via maliciously crafted FlashPix images and have the same effect as the JP2 ones.

As far as bugs in the handling of movie files go, one concerns AVIs (CVE-2010-3789), two MPEGs (CVE-2010-3791 and CVE-2010-3792), one QTVRs (CVE-ID: CVE-2010-3802), one Sorenson-encoded (CVE-2010-3793), and three unspecified format (CVE-2010-1508, CVE-2010-4009 and CVE-2010-3790).

CVE-2010-1508 in particular affects only Windows-based systems and concerns the handling of Track Header (tkhd) atoms.

The other Windows-only flaw is identified as CVE-2010-0530 and stems from a file system permissions issue. It can be exploited to disclose sensitive information located in the "Apple Computer" directory.

Finally, the last remote code execution vulnerability (CVE-2010-3800) stems from improper handling of PICT files, a graphics format developed by Apple.

The QuickTime 7.6.9 update is only available for Windows and Mac OS X v10.5.8 (Leopard), because Mac OS X 10.6 comes with an entirely different version called QuickTime X.

QuickTime 7.6.9 for Windows can be downloaded here.

QuickTime 7.6.9 for Mac can be downloaded here.