(Last Updated On: )
QuickTime関連の脆弱性多さは非常に目につきます。また見つかったようです。
http://www.milw0rm.com/exploits/4885
During my tests I have been able to fully overwrite the return address
anyway note that the visible effects of the vulnerability could change
during the usage of the debugger (in attaching mode it’s everything
ok).
と書いてあるので任意コード実行が可能です。
======
4) Fix
======No fix
0dayらしいので不必要に「rtsp://」は開かない事…
Leave a Comment