![]() ![]() US-CERT has released its own notification, calling on Windows users to uninstall the software (Mac users are not affected). TrendMicro goes on to write that both exploits are remote code execution vulnerabilities that would require an end user to actively visit a malicious webpage or open a malicious file to exploit them. ![]() In this regard, QuickTime for Windows now joins Microsoft Windows XP and Oracle Java 6 as software that is no longer being updated to fix vulnerabilities and subject to ever increasing risk as more and more unpatched vulnerabilities are found affecting it. But the only way to protect your Windows systems from potential attacks against these or other vulnerabilities in Apple QuickTime now is to uninstall it. We’re not aware of any active attacks against these vulnerabilities currently. And because Apple is no longer providing security updates for QuickTime on Windows, these vulnerabilities are never going to be patched. These advisories are being released in accordance with the Zero Day Initiative’s Disclosure Policy for when a vendor does not issue a security patch for a disclosed vulnerability. While Apple’s native software continues to come pre-installed with Mac, the Windows version needs to be separately downloaded. ![]() However, with the increasing popularity of Windows Media Player, GOM Player, and Media Player Classic, QuickTime took a backseat. Details to remove the offending software from your computer can be found here. QuickTime remained the most popular multimedia player for over a decade. Ur Zero Day Initiative has just released two advisories ZDI-16-241 and ZDI-16-242 detailing two new, critical vulnerabilities affecting QuickTime for Windows. The Wall Street Journal reports that Apple has confirmed itll no longer update or support Quicktime 7 for Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |