Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:32394
HistoryAug 23, 2015 - 12:00 a.m.

APPLE-SA-2015-08-20-1 QuickTime 7.7.8

2015-08-2300:00:00
vulners.com
34

EPSS

0.573

Percentile

97.7%

APPLE-SA-2015-08-20-1 QuickTime 7.7.8

QuickTime 7.7.8 is now available and addresses the following:

QuickTime
Available for: Windows 7 and Windows Vista
Impact: Processing a maliciously crafted file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-5751 : WalkerFuz
CVE-2015-5779 : Apple
CVE-2015-5785 : Fortinet's FortiGuard Labs
CVE-2015-5786 : Ryan Pentney and Richard Johnson of Cisco Talos

QuickTime 7.7.8 may be obtained from the QuickTime Downloads site:
http://www.apple.com/quicktime/download/

You may also update to the latest version of QuickTime via Apple
Software Update, which can be found in the Start menu.

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/