Another Apple QuickTime bug reported

Share this article:
US-CERT has issued an alert concerning a new zero-day vulnerability in the Apple QuickTime media player.

Attackers can exploit the flaw to install malicious code on a user's machine if they open a specially crafted QuickTime file, US-CERT said Wednesday evening.

The researcher who reportedly discovered the vulneraiblity, Petko Petkov of the Gnucitizen think tank, could not immediately be reached for comment.

"US-CERT encourages users to use caution when opening QuickTime files, and apply best security practices...to help mitigate the risks," according to the alert.

So far this year, Apple has delivered three security updates to remedy bugs in QuickTime.

Vulnerable client-side software is nothing new, as researchers have reported similar problems in other offerings.

An Apple spokeswoman did not respond to a request for comment on Thursday.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Popular Science served up Rig Exploit Kit on its website

The monthly science magazine served up malicious code to readers earlier this week and has remedied the issue.

Deloitte releases paper on vetting leaks, avoiding costly hoax

Deloitte releases paper on vetting leaks, avoiding costly ...

The research presents techniques for distinguishing legit data leaks from false claims.

Attack on White House systems breached unclassified networks

The White House experienced a sustained cyberattack on its systems that impacted its network for nearly two weeks.