CERT mailing list archives
TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Thu, 14 Apr 2016 16:15:25 -0500
U.S. Department of Homeland Security US-CERT National Cyber Awareness System: TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced [ https://www.us-cert.gov/ncas/alerts/TA16-105A ] 04/14/2016 03:48 PM EDT Original release date: April 14, 2016 Systems Affected Microsoft Windows with Apple QuickTime installed Overview According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1] [ http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/ ] Description All software products have a lifecycle. Apple will no longer be providing security updates for QuickTime for Windows. [1] [ http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/ ] The Zero Day Initiative has issued advisories for two vulnerabilities found in QuickTime for Windows. [2] [ http://zerodayinitiative.com/advisories/ZDI-16-241/ ] [3] [ http://www.zerodayinitiative.com/advisories/ZDI-16-242/ ] Impact Computer systems running unsupported software are exposed to elevated cybersecurity dangers, such as increased risks of malicious attacks or electronic data loss. Exploitation of QuickTime for Windows vulnerabilities could allow remote attackers to take control of affected systems. Solution Computers running QuickTime for Windows will continue to work after support ends. However, using unsupported software may increase the risks from viruses and other security threats. Potential negative consequences include loss of confidentiality, integrity, or availability of data, as well as damage to system resources or business assets. The only mitigation available is to uninstall QuickTime for Windows. Users can find instructions for uninstalling QuickTime for Windows on the Apple Uninstall QuickTime [ https://support.apple.com/en-us/HT205771 ] page. [4] References * [1] Trend Micro - Urgent Call to Action: Uninstall QuickTime for Windows Today [ http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/ ] * [2] Zero Day Initiative Advisory ZDI 16-241: (0Day) Apple QuickTime moov Atom Heap Corruption Remote Code Execution Vulnerabilit [ http://zerodayinitiative.com/advisories/ZDI-16-241/ ] * [3] Zero Day Initiative Advisory ZDI 16-242: (0Day) Apple QuickTime Atom Processing Heap Corruption Remote Code Execution Vulner [ http://www.zerodayinitiative.com/advisories/ZDI-16-242/ ] * [4] Apple - Uninstall QuickTime 7 for Windows [ https://support.apple.com/en-us/HT205771 ] Revision History * April 14, 2016: Initial Release ________________________________________________________________________ This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy. ________________________________________________________________________ A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () ncas us-cert gov to your address book. OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ] STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ]
Current thread:
- TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced US-CERT (Apr 14)