Hackers have created a proof-of-concept exploit for an Apple QuickTime player streaming media vulnerability.
Release of the exploit on Sunday follows hot on the heels of the public disclosure of the as-yet-unpatched buffer overflow bug, which involves the QuickTime RTSP (Real Time Streaming Protocol) Response Header, on 23 November by Polish security researcher Krystian Kloskowski.
Symantec reports that the exploit might be applied to attack users of the latest version of stand-alone QuickTime players (version 7.3), tricked into opening malicious content on hacker-controlled websites. The same attack only crashes the browser of users of QuickTime browser plugins. Email-based attacks featuring attachments with hostile XML code that open a connection to malicious servers are also possible. This attack requires users to double-click on the malicious QuickTime multimedia attachment to run.
Both attacks rely on initiating a RTSP connection on port 554 leading to the transmission of hostile code. Symantec reports that both IE 6 and 7 (as well as Safari 3 block the attack. However, relying on this as a defence may be unwise. "Attackers may attempt to refine the exploit in the coming days in order to overcome this initial hiccup and work to create a reliable exploit that works on Internet Explorer," Symantec notes.
For the meantime, Firefox users are more exposed to the problem, especially if they've selected QuickTime as the default player for multimedia formats.
Pending a patch from Microsoft, users are advised to restrict outbound connections on port TCP 554 using their firewalls, advice that's probably easier to apply in corporate environments. Home users are warned to avoid any temptation to follow links to untrusted websites.
Symantec's write-up of the flaw, featuring screenshots showing the exploit code at work, can be found here. ®