Apple patches Windows QuickTime bug
Look before you link
Windows users of QuickTime, Apple's popular media player software, need to apply an update following the discovery of a serious security bug.
The vulnerability allows hackers to inject malicious code onto vulnerable systems providing users are tricked into opening a maliciously-constructed QTL (QuickTime Link) file. These files could be hosted on websites and disguised as links to movie clips or smut.
Apple published an update on Wednesday for QuickTime 7.2 on Windows Vista and XP SP2 that fixes the flaw. Users of QuickTime for Mac OS X are immune to the bug.
In a security notice, Apple explains the bug stems from flaws in the way Windows versions of QuickTime handle URLs in the qtnext field of QTL files. The fix involves improving the handling of these URLs. ®
Gimme some of yo' spin, Apple!
"In a security notice, Apple explains the bug stems from flaws in the way Windows versions of QuickTime handle URLs in the qtnext field of QTL files."
Nice spin. Smoooooth. "...flaws in the way Windows..." Why let truth get in the way of good spin?
Error in your app? Sloppy out-sourced programing, or even sloppy in-house moneys doing the work? EASY! Blame MS!
"Why won't quicktime die already?"
It's just too bastard USEFUL, that's why.
qucik time has always been a bit er ahem
Why would anyone want to use this closed format anyway, if your that up job's bum cheeks you'd use this I guess you'd deserve an exploit or two anyway.
Why won't quicktime die already?