The update fixes the issue by performing additional bounds checking when creating QTPointerRef objects, according to Apple’s advisory. To execute malicious code, an attacker must lure a user to a webpage containing a maliciously crafted Java applet. Apple updated QuickTime to version 7.1.6 on Tuesday, fixing the vulnerability on Mac OS X versions 10.3.9 and 10.4.9, Windows XP with Service Pack 2 and Windows 2000 with Service Pack 4.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |