|30 Aug 2010||#1|
| || |
Apple QuickTime backdoor creates code-execution peril
Confirmed on Windows XP, Windows Vista and Windows 7:
A security researcher has unearthed a “bizarre” flaw in Apple's QuickTime Player that can be exploited to remotely execute malicious code on Windows-based PCs, even those running the most recent versions of operating system.
Technically, the inclusion of an unused parameter known as “_Marshaled_pUnk” is a backdoor because it is the work of an Apple developer who added it to to the QuickTime code base and then, most likely, forgot to remove it when it was no longer needed. It sat largely undetected for at least nine years until Ruben Santamarta of Spain-based security firm Wintercore discovered it and realized it could be exploited to take full control of machines running Windows 7, Microsoft's most secure operating system to date.
|My System Specs|
|Similar help and support threads for2: Apple QuickTime backdoor creates code-execution peril|
|Apple patches security holes in QuickTime on Windows||Security News|
|Vulnerability in Internet Explorer Could Allow Remote Code Execution||Security News|
|Gadgets Could Allow Remote Code Execution||System Security|
|Apple QuickTime update for Windows only; Macs already secure||Security News|
|Apple QuickTime backdoor||News|
|Apple Quicktime URL redirected??||Browsers & Mail|
|Researcher spies new Adobe code execution bug.||Security News|
|Our Sites ||Site Links ||About Us ||Find Us |
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.
© Designer Media Ltd
All times are GMT -5. The time now is 05:20 PM.