{"id":357,"date":"2006-03-13T22:42:51","date_gmt":"2006-03-13T15:42:51","guid":{"rendered":""},"modified":"2006-03-13T22:42:51","modified_gmt":"2006-03-13T15:42:51","slug":"eeye-flags-more-itunes-quicktime-flaws","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2006\/03\/eeye-flags-more-itunes-quicktime-flaws\/","title":{"rendered":"eEye Flags More iTunes, QuickTime Flaws"},"content":{"rendered":"<p>Researchers at eEye Digital Security have pinpointed two high-risk vulnerabilities in iTunes and QuickTime that could put millions of Windows and Mac users at risk of code execution attacks.<br \/>\nOd4ys exploits soon?<!--more--><\/p>\n<p>Aliso Viejo, Calif.-based eEye issued two alerts on its upcoming advisories Web page to warn of heap overflows and integer overflows in the two Apple products.<\/p>\n<p>Apple&#8217;s iTunes is a wildly popular online media service that sells music downloads and QuickTime is the company&#8217;s flagship media player.<\/p>\n<p>eEye said the vulnerabilities affect QuickTime\/iTunes on Windows NT, Windows 2000, Windows XP and Windows Server 2003. Mac OS X users are also vulnerable to the code execution attacks.<\/p>\n<p>Apple does not comment on potential security vulnerabilities in its products until a fix is available. eEye only releases basic information on the existence of the bugs but withholds technical details until a patch is ready.<\/p>\n<p>In the meantime, users are urged to avoid clicking on untrusted media files.<\/p>\n<p>The latest flaw discoveries come at a sensitive time for Apple. The company is under intense scrutiny after the recent release of exploit code for a Safari browser flaw and the discovery of two pieces of malware affecting Mac OS X users.<\/p>\n<p>On March 1, Apple shipped a Mac OS X security update with patches for more than a dozen security vulnerabilities. The monster update included five patches for Safari, including an &#8220;extremely critical&#8221; flaw that could cause remote code execution attacks if a user simply viewed a maliciously rigged Web page.<\/p>\n<p>from [url=http:\/\/www.eweek.com\/article2\/0,1895,1936596,00.asp]eWeek[\/url]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>eEye Flags More iTunes, QuickTime Flaws<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-apple"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-5L","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}