summaryrefslogtreecommitdiff
path: root/published/Webmonkey/Monkey_Bites/2007/05.29.07/Wed/qt.txt
diff options
context:
space:
mode:
authorluxagraf <sng@luxagraf.net>2015-10-25 08:45:11 -0400
committerluxagraf <sng@luxagraf.net>2015-10-25 08:45:11 -0400
commit0531523b372cc251a8391f5a12447d62f53916a9 (patch)
tree7e9c54c11f6d0283accdf10028966ceeb8e9a2bf /published/Webmonkey/Monkey_Bites/2007/05.29.07/Wed/qt.txt
initial commit
Diffstat (limited to 'published/Webmonkey/Monkey_Bites/2007/05.29.07/Wed/qt.txt')
-rw-r--r--published/Webmonkey/Monkey_Bites/2007/05.29.07/Wed/qt.txt11
1 files changed, 11 insertions, 0 deletions
diff --git a/published/Webmonkey/Monkey_Bites/2007/05.29.07/Wed/qt.txt b/published/Webmonkey/Monkey_Bites/2007/05.29.07/Wed/qt.txt
new file mode 100644
index 0000000..f85fa76
--- /dev/null
+++ b/published/Webmonkey/Monkey_Bites/2007/05.29.07/Wed/qt.txt
@@ -0,0 +1,11 @@
+If you use Apple's Software Update to download the new iTunes update you'll notice there's also an update available for Quicktime which marks the second Quicktime has been updated this month. Earlier in the month Apple released an update to [address the flaws found during last month's Hack A Mac contest][1].
+
+Today's release [addresses two flaws in Quicktime][2] both related to how Quicktime interacts with Java. One of the flaws will allow for remote code execution and the other will expose sensitive user data.
+
+Both flaws require a user to visit a site containing a maliciously crafted Java applet.
+
+The updates are recommended for all users on both Windows and Mac. And while you're at it make sure that you've got the previous update installed since the security firm Secunia said earlier this month that only about a third of users have downloaded that patch.
+
+
+[1]: http://blog.wired.com/monkeybites/2007/05/apple_patches_q.html "Apple Patches Quicktime, Security Firm Still Not Happy"
+[2]: http://docs.info.apple.com/article.html?artnum=305531 "Security Update (QuickTime 7.1.6)" \ No newline at end of file