26 November 2007 @ 11:28QuickTime 7.3 Buffer Overflow Exploit
Secunia has issued a security advisory (SA27755) for a buffer overflow exploit in QuickTime and has labeled it as “extremely critical”.
The vulnerability is caused due to a boundary error when processing RTSP replies and can be exploited to cause a stack-based buffer overflow via a specially crafted RTSP reply containing an overly long “Content-Type” header.
by Jon | Add a comment | Posted in apple, exploits, security | Link to this