All Windows Users at Risk of Quicktime Flaw
Shortly after announcing a severe iTunes flaw that affects over 40 Windows applications just last week, it now appears Apple's popular media player, QuickTime, also includes a flaw that could be exploited by hackers to execute malicious code on PCs using the Windows operating system (OS).
Even systems running more recent versions of the OS, Windows Vista and Windows 7, are vulnerable.
"At present the security vulnerability seems to be with users that run Internet Explorer. Given the relative ease with which [the exploit was demonstrated], the chance for drive-by [download] attacks to succeed is high," says tech blog The Inquirer. (Source: theinquirer.net)
Flaw "Probably an Oversight"
The QuickTime weakness is related to an unused parameter called "Marshaled_pUnk," added by an Apple developer to the program's code base and, presumably, forgotten even after it was no longer needed.
Surprisingly, the parameter which causes the flaw isn't new. In fact, experts estimate that it's been sitting around undetected in QuickTime code for almost a decade. (Source: computerworld.com)
That was, of course, until it was discovered this week by security analyst Ruben Santamarta, a researcher with the Spanish firm Wintercore. A curious Santamarta tested the exploit and found it could be used to hijack and overtake a PC running Windows 7.
A Bizarre Bug
Experts are floored that this old flaw could still pose such a risk to Windows users. "The bug is is pretty bizarre," said H D Moore, Rapid7 CSO and chief architect of the Metasploit project.
"It's not a standard vulnerability in the sense that a feature was implemented poorly. It was more kind of a leftover development piece that was left in production. It's probably an oversight." (Source: theregister.co.uk)
Microsoft Defenses Useless
The presence of pUnk in the code means that an attacker could use the backdoor as a way to insert malicious code into a computer's memory.
Although Microsoft has built features into Windows that essentially block these kinds of attacks, Santamarta recognized that the QuickTime flaw circumvents these protection strategies by loading a Windows Live file called WindowsLiveLogin.dll into a system's memory in order to rearrange commands, which could allow for remote code execution.
Security firm Symantec advises that users worried about the issue can disable the QuickTime plug-in until a patch is available. (Source: symantec.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.