The SANS Internet Storm Center says Apple's Quicktime 7.3 update fixed "a number of serious vulnerabilities," including:
* A memory corruption bug which can be triggered by a maliciously crafted movie. It could potentially result in arbitrary code execution (CVE-2007-2395)
* A heap overflow in the use of Sample Table Sample Descriptor atoms, which can be triggered through maliciously crafted movie files. It could potentially result in arbitrary code execution (CVE-2007-3750).
* Vulnerabilities in Quicktime for Java which could allow untrusted applets to obtain elevated privileges (CVE-2007-3751).
* Two bugs in PICT file processing, potentially resulting in arbitrary code execution (CVE-2007-4672).
* A bug in QTVR movie file parsing which could result in arbitrary code execution (CVE-2007-4675).
* A bug in the parsing of color table atoms which could result in arbitrary code execution (CVE-2007-4677).
The Quicktime flaw wasn't just an idle issue, either. Spammers have been specifically pinpointing softness in Quicktime -- and using Britney Spears as a weapon of attack. The folks at Marshal TRACE report:
Today, looking through our detected spam we have seen a number of emails with subject lines related to Britney Spears. The emails contain only a link to a website and are targeting recipients whose browsers have an older version of the Apple QuickTime plug-in installed. The emails contain subject lines such as:
Britney Spears shows it again!
Britney Spears booked on traffic charge
The advice they provide: don't click links in unsolicited email, especially containing references to celebrities who have been in the headlines of the day. Well, yeah. That certainly sounds like a no-brainer (at this point, it's probably not even advisable for Britney to click open her own email), until you realize the spammers must keep using this tactic because it works.