Hackers expoit Apple Quicktime vulnerability

Apple's QuickTime software is being targeted by hackers using a flaw that could allow them to run malicious code on a victim's computer.


An unpatched vulnerability in Apple's QuickTime software is being targeted by hackers, according to Symantec. The flaw could allow hackers to run code on a victim's computer, Symantec warned in a DeepSight Threat Management System alert issued on Sunday.

Symantec issued a warning of the isuue over the weekend. The attacks appear to be aimed at Windows users, but Mac OS users could also be at risk since the QuickTime vulnerability in question affects both operating systems, the alert said. That vulnerability, called the Apple QuickTime RTSP Response Header Stack-Based Buffer Overflow Vulnerability, was first disclosed on November 23 and remains unpatched by Apple. Code to exploit the flaw was available online last week.

Researchers have shown that the QuickTime vulnerability affects a range of operating systems, including Windows XP, Windows Vista, MacOS X 10.4, and the recently released MacOS X 10.5, also called Leopard. The vulnerability can be exploited through Internet Explorer, Firefox, Opera, and Safari.

There are two types of attacks underway, Symantec said. In the first, victims' computers are being redirected from an adult website, Ourvoyeur.net, to another website that infects the computer with an application called loader.exe, which can be saved to the computer as metasploit.exe, asasa.exe, or syst.exe. Once installed on a computer this application downloads another binary file, which Symantec identified as Hacktool.Rootkit, a set of tools that can be used to break into a system.

Symantec said it was possible attackers had managed to compromise Ourvoyeur.net as part of the attack.

The second attack also involves redirection, and Symantec is currently investigating the attack to determine what if any malicious code is involved.

To protect systems from attack, Symantec recommended blocking access to affected sites. "Filter outgoing access to,,,,, and Additionally 2005-search.com, 1800-search.com, search-biz.org, and ourvoyeur.net should be filtered," it said, adding IT managers can also block outgoing TCP access to port 554.

Alternatively, IT managers could take more drastic steps. "As a last measure, QuickTime should be uninstalled until patches are available," the alert said.

"As a last measure, QuickTime should be uninstalled until patches are available," the alert said.

For more PC security news, reviews and tutorials, see Security Advisor

"Recommended For You"

Facebook attacks zoom in on photo flaw Old QuickTime bugs patched by Apple