Monday, December 3, 2007

Attackers Exploiting Unpatched QuickTime Flaw

Via ComputerWorld -

December 02, 2007 (IDG News Service) -- Attackers are trying to exploit an unpatched vulnerability in Apple's QuickTime software that could let them run code on a victim's computer, Symantec warned in a DeepSight Threat Management System alert issued Sunday.

Computerworld reported proof-of-concept code for the vulnerability on Thursday, and the bug was disclosed on the milw0rm.com site the weekend before that.

First observed on Saturday, the attacks appear to be aimed at Windows users, but Mac OS users could also be at risk since the QuickTime vulnerability in question affects both operating systems, the alert said. That vulnerability, called the Apple QuickTime RTSP Response Header Stack-Based Buffer Overflow Vulnerability, was first disclosed on Nov. 23 and remains unpatched by Apple.

Researchers have shown that the QuickTime vulnerability affects a range of operating systems, including Windows XP, Windows Vista, MacOS X 10.4, and the recently released MacOS X 10.5, also called Leopard. The vulnerability can be exploited through Internet Explorer, Firefox, Opera, and Safari.

There are two types of attacks underway, Symantec said. In the first, victims' computers are being redirected from an adult Web site, Ourvoyeur.net, to another Web site that infects the computer with an application called loader.exe, which can be saved to the computer as metasploit.exe, asasa.exe, or syst.exe. Once installed on a computer this application downloads another binary file, which Symantec identified as Hacktool.Rootkit, a set of tools that can be used to break into a system.

Symantec said it was possible attackers had managed to compromise Ourvoyeur.net as part of the attack.

The second attack also involves redirection, and Symantec is currently investigating the attack to determine what if any malicious code is involved.

---------------------

Thank god Apple takes security serious....so serious in fact that they have no comment.

No comments:

Post a Comment