{"id":248,"date":"2007-01-03T17:33:16","date_gmt":"2007-01-03T23:33:16","guid":{"rendered":"https:\/\/blog.mhvt.net\/?p=248"},"modified":"2008-07-11T12:59:44","modified_gmt":"2008-07-11T20:59:44","slug":"apple-quicktime-rtsp-vulnerability","status":"publish","type":"post","link":"https:\/\/blog.mhvt.net\/?p=248","title":{"rendered":"Apple QuickTime RTSP Vulnerability"},"content":{"rendered":"<p><a href=\"\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/graphics\/icons\/quicktime.jpg\" height=\"120\" width=\"120\" alt=\"QuickTime\" \/><\/a><\/p>\n<p>Danish security management company has released a security advisory report for the current version of QuickTime, version 7.1.3.  According to Secunia, QuickTime&#8217;s flaw can cause buffer overflow in handling RTSP URLs.  This flaw can then allow the exploiter to direct the user to malicious websites.  Secunia rates this QuickTime vulnerability &#8216;highly critical.&#8217;  Both Mac and Windows versions of QuickTime are both vulnerable, Secunia.  <!--more--><\/p>\n<p>Secunia&#8217;s security report is based on Month of the Apple Bugs (MOAB)&#8217;s report.  The Month of Apple Bugs is run by LMH and et al.  LMH is a person who only identifies himself as LMH, and MOAB has chosen January as the security awareness month for Mac OS X.<\/p>\n<p>Click on the button to go to Secunia. <a href=\"http:\/\/secunia.com\/advisories\/23540\/\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/eng\/graphics\/button.gif\" width=\"25\" height=\"25\" alt=\"VTC\" \/><\/a><br \/>\nClick on the button to go to MOAB. <a href=\"http:\/\/projects.info-pull.com\/moab\/\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/eng\/graphics\/button.gif\" width=\"25\" height=\"25\" alt=\"VTC\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Danish security management company has released a security advisory report for the current version of QuickTime, version 7.1.3. According to Secunia, QuickTime&#8217;s flaw can cause buffer overflow in handling RTSP URLs. This flaw can then allow the exploiter to direct &hellip; <a href=\"https:\/\/blog.mhvt.net\/?p=248\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":342,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,22],"tags":[],"class_list":["post-248","post","type-post","status-publish","format-standard","hentry","category-apple-mac","category-internet-security"],"_links":{"self":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/users\/342"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=248"}],"version-history":[{"count":0,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/248\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}