Apple patched seven bugs in QuickTime as it updated the media player to Version 7.3 for both Mac OS X and Windows yesterday.
All but one of the vulnerabilities would be ranked critical by other vendors, but Apple does not rate flaws or assign an urgency score to patches. Instead, it uses the phrasing 'arbitrary code execution' to note bugs that could be used by attackers to inject their own malicious software into an unpatched machine.
Two of the seven vulnerabilities are related to QuickTime's rendering of PICT images, one to how the player handles the QTVR (QuickTime Virtual Reality) file format, three to its movie file management, and one to how it works with Java applets.
The six flaws that involve image or video file formats can be exploited by attackers able to dupe users into opening malformed files, while the seventh - the one related to Java - could be used simply by getting a user to a website with a malicious applet. That vulnerability, however, can result in remote code execution only if the attacker has some, if only limited, access rights to the target Mac or PC, said Apple.
QuickTime can be updated using Mac OS X's built-in Software Update feature, while Windows XP and Vista users can either download QuickTime 8.3 from the Apple Web site or use the update tool packaged with earlier editions.