malware
New Member
- Joined
- Nov 7, 2004
- Messages
- 5,422 (0.73/day)
- Location
- Bulgaria
Processor | Intel Core 2 Quad Q6600 G0 VID: 1.2125 |
---|---|
Motherboard | GIGABYTE GA-P35-DS3P rev.2.0 |
Cooling | Thermalright Ultra-120 eXtreme + Noctua NF-S12 Fan |
Memory | 4x1 GB PQI DDR2 PC2-6400 |
Video Card(s) | Colorful iGame Radeon HD 4890 1 GB GDDR5 |
Storage | 2x 500 GB Seagate Barracuda 7200.11 32 MB RAID0 |
Display(s) | BenQ G2400W 24-inch WideScreen LCD |
Case | Cooler Master COSMOS RC-1000 (sold), Cooler Master HAF-932 (delivered) |
Audio Device(s) | Creative X-Fi XtremeMusic + Logitech Z-5500 Digital THX |
Power Supply | Chieftec CFT-1000G-DF 1kW |
Software | Laptop: Lenovo 3000 N200 C2DT2310/3GB/120GB/GF7300/15.4"/Razer |
An Italian security researcher has posted a proof-of-concept exploit for a zero-day vulnerability in the most current version of Apple's QuickTime media software (7.3.1) which affects both Windows and Mac OS X. According to Luigi Auriemma the bug is a buffer-overflow which happens during the handling of the HTTP error message and its visualization in the LCD-like screen which contains info about the status of the connection. Buffer overflows can often be exploited by attackers to compromise the affected system. In this scenario, that's exactly what this bug can do. It can allow the attacker to take control the affected system. The vulnerability Auriemma has identified has no fix at the moment, so keep it in mind if you use the latest QuickTime on your system. Find out more about the exploit here.
View at TechPowerUp Main Site
View at TechPowerUp Main Site