26 November 2007 @ 11:28QuickTime 7.3 Buffer Overflow Exploit

Secunia has issued a security advisory (SA27755) for a buffer overflow exploit in QuickTime and has labeled it as “extremely critical”.

The vulnerability is caused due to a boundary error when processing RTSP replies and can be exploited to cause a stack-based buffer overflow via a specially crafted RTSP reply containing an overly long “Content-Type” header.

Be Sociable, Share!

by | Add a comment | Posted in apple, exploits, security | Link to this

Add a Comment

Show who you are with a Gravatar.


Sign up for PayPal and start accepting credit card payments instantly.

Staples Logo

Get fed!

rss icon subscribe to Geek stuff

rss icon Geek stuff in your inbox

Add the "Geek stuff" Google Gadget to your homepage

Add the "Daily Deals" Google Gadget to your homepage


Search Amazon

Search Amazon.com
Search Amazon.co.uk

Recent Forum Topics


    Web hosting by ICDSoft