The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Apple plugs QuickTime zero-day flaw
Time: 19:35 EST/00:35 GMT | News Source: News.com | Posted By: Jonathan Tigner

Apple on Tuesday released a QuickTime update to fix a security flaw that was used to breach a MacBook Pro at a recent security conference.

The media player vulnerability lies in QuickTime for Java, Apple said in a security alert. The hole could be exploited through a rigged Web site and let an attacker commandeer computers running both Mac OS X and Windows, the Mac maker said.

"By enticing a user to visit a Web page containing a maliciously crafted Java applet, an attacker can trigger the issue, which may lead to arbitrary code execution," Apple said. Only computers running an unfixed version of QuickTime would be at risk.

Security monitoring company Secunia deems the flaw "highly critical," one notch below its most serious rating. The update, QuickTime 7.1.6, repairs the problem by performing additional checking. Apple credits bug hunter Dino Dai Zovi and the TippingPoint Zero Day Initiative for reporting the issue.

Write Comment
Return to News

  Displaying 151 through 151 of 151
Prev | First
  The time now is 2:22:08 AM ET.
Any comment problems? E-mail us
#151 By 4240821 (193.36.231.111) at 7/2/2024 7:13:33 AM
https://sexonly.top/get/b554/b554gkyjnxdreidqyyf.php
https://www.playvids.com/v/Vnzp73BGPo6
https://telegra.ph/victoriaxxcumming-OnlyFans-Leaked-07-22
https://sexonly.top/get/b672/b672ewlaphmhgfcklib.php
https://sexonly.top/get/b1000/b1000clgkeyrfwioiokk.php
https://sexonly.top/get/b789/b789bmtxckbkrfaxvmc.php
https://sexonly.top/get/b937/b937jpihnzncrybgthl.php
https://sexonly.top/get/b543/b543hrtskgumnestqfg.php
https://telegra.ph/PrincessDaze-NSFW-Fansly-Leak-01-06
https://sexonly.top/get/b294/b294grgvxzrnurtdkoa.php

Write Comment
Return to News
  Displaying 151 through 151 of 151
Prev | First
  The time now is 2:22:08 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *