<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security &#8211; Blogvaria</title>
	<atom:link href="https://blog.evaria.com/key/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.evaria.com</link>
	<description>The personal pages</description>
	<lastBuildDate>Tue, 10 Jun 2008 15:29:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
<site xmlns="com-wordpress:feed-additions:1">1077093</site>	<item>
		<title>QuickTime &#8211; no thanks</title>
		<link>https://blog.evaria.com/2008/quicktime-no-thanks/</link>
		
		<dc:creator><![CDATA[Wennichen]]></dc:creator>
		<pubDate>Tue, 10 Jun 2008 15:29:22 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[QuickTime]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://blog.evaria.com/?p=865</guid>

					<description><![CDATA[After 8 security fixes last year (according to Secunia) the Danish security company CSIS named Apple Quicktime as the biggest isolated security risk of 2007. Today Apple announces its third &#8230; ]]></description>
										<content:encoded><![CDATA[<p>After 8 security fixes last year (according to <a href="http://secunia.com/advisories/29293/" target="_blank">Secunia</a>) the Danish security company <a href="http://csis.dk/en/frontpage/index.shtm" target="_blank">CSIS</a> named Apple Quicktime as the biggest isolated security risk of 2007. Today Apple announces its <a href="http://support.apple.com/kb/HT1991" target="_blank">third major fix</a> this year.</p>
<p>The main 5 is listed below (source: Secunia):</p>
<ol>
<li>A boundary error when parsing packed scanlines from a PixData structure in a PICT file can be exploited to cause a heap-based buffer overflow via a specially crafted PICT file.</li>
<li>An error in the processing of AAC-encoded media content can be exploited to cause a memory corruption via a specially crafted media file.</li>
<li>A boundary error in the processing of PICT files can be exploited to cause a heap-based buffer overflow via a specially crafted PICT file.</li>
<li>A boundary error in the processing of Indeo video codec content can be exploited to cause a stack-based buffer overflow via a specially crafted movie file with Indeo video codec content.</li>
<li>An error in the handling of &#8220;file:&#8221; URLs can be exploited to e.g. execute arbitrary programs when playing specially crafted QuickTIme content in QuickTime Player.</li>
</ol>
<p>As the &#8220;trend&#8221; seems to continue I&#8217;ll use alternative media players (as I&#8217;ve always done), and it appears you should do it too&#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">865</post-id>	</item>
	</channel>
</rss>
