![]() QuickTime is a Shareware software in the category Audio & Multimedia developed by Apple Inc. ![]() QuickTime also features built-in support for digital video, including the DV camcorder formats, as well as support for AVI, AVR, MPEG-1, H.263, and OpenDML. Plus, it supports every major file format for images, including JPEG, BMP, PICT, PNG and GIF. It also supports key standards for web streaming, including HTTP, RTP and RTSP. This issue was addressed through improved bounds checking.QuickTime is Apple's cutting-edge digital media software for both Mac and Windows-based computers delivers unparalleled quality for creating, playing and streaming audio and video content over the Internet.īesides playing MPEG-4 and MP3 content, it supports timecode tracks as well as MIDI standards such as the Roland Sound Canvas and GS format extensions. Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code executionĭescription: A buffer overflow existed in the handling of 'rnet' boxes in MP4 files. ![]() This issue was addressed through improved bounds checking. Impact: Viewing a maliciously crafted Targa file may lead to an unexpected application termination or arbitrary code executionĭescription: A buffer overflow existed in the handling of Targa image files. This issue was addressed through improved memory management.ĬVE-2012-3754 : CHkr_d591 working with iDefense VCP This issue was addressed through improved bounds checking.ĬVE-2012-3753 : Pavel Polischouk, Vulnerability Research Team, TELUS Security Labsĭescription: A use after free issue existed in the QuickTime ActiveX control's handling of the Clear() method. These issues were addressed through improved bounds checking.ĬVE-2012-3752 : Arezou Hosseinzad-Amirkhizi, Vulnerability Research Team, TELUS Security Labsĭescription: A buffer overflow existed in the QuickTime plugin's handling of MIME types. This issue was addressed through improved bounds checking.ĬVE-2012-3758 : Alexander Gavrun working with HP TippingPoint's Zero Day Initiativeĭescription: Multiple buffer overflows existed in the handling of style elements in QuickTime TeXML files. Impact: Viewing a maliciously crafted QuickTime TeXML file may lead to an unexpected application termination or arbitrary code executionĭescription: A buffer overflow existed in the handling of the transform attribute in text3GTrack elements. This issue was addressed through improved memory handling.ĬVE-2012-3751 : chkr_d591 working with iDefense VCP Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code executionĭescription: A use after free issue existed in the QuickTime plugin's handling of '_qtactivex_' parameters within a HTML object element. This issue was addressed through improved bounds checking.ĬVE-2012-3757 : Jeremy Brown at Microsoft and Microsoft Vulnerability Research (MSVR) This issue was addressed through improved bounds checking.ĬVE-2011-1374 : Mark Yason of the IBM X-Forceĭescription: A memory corruption issue existed in the handling of PICT files. Impact: Viewing a maliciously crafted PICT file may lead to an unexpected application termination or arbitrary code executionĭescription: A buffer overflow existed in the handling of REGION records in PICT files. ![]() Available for: Windows 7, Vista, XP SP2 or later ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |