The vulnerability, called the Apple QuickTime RTSP Response Header Stack-Based Buffer Overflow Vulnerability, was first disclosed on Nov. 23rd and still remains unpatched. The vulnerability can be exploited through Internet Explorer, Firefox, Opera, and Safari and effects both Windows and Mac users.
First observed on Saturday, the attacks appear to be aimed at Windows users, but Mac OS users could also be at risk since the QuickTime vulnerability in question affects both operating systems, the alert said. That vulnerability, called the Apple QuickTime RTSP Response Header Stack-Based Buffer Overflow Vulnerability, was first disclosed on Nov. 23 and remains unpatched by Apple.
Researchers have shown that the QuickTime vulnerability affects a range of operating systems, including Windows XP, Windows Vista, MacOS X 10.4, and the recently released MacOS X 10.5, also called Leopard. The vulnerability can be exploited through Internet Explorer, Firefox, Opera, and Safari.
There are two types of attacks underway, Symantec said. In the first, victims’ computers are being redirected from an adult Web site, Ourvoyeur.net, to another Web site that infects the computer with an application called loader.exe, which can be saved to the computer as metasploit.exe, asasa.exe, or syst.exe. Once installed on a computer this application downloads another binary file, which Symantec identified as Hacktool.Rootkit, a set of tools that can be used to break into a system.
Symantec said it was possible attackers had managed to compromise Ourvoyeur.net as part of the attack.
The second attack also involves redirection, and Symantec is currently investigating the attack to determine what if any malicious code is involved.
To protect systems from attack, Symantec recommended blocking access to affected sites. “Filter outgoing access to 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, and 22.214.171.124. Additionally 2005-search.com, 1800-search.com, search-biz.org, and ourvoyeur.net should be filtered,” it said, adding IT managers can also block outgoing TCP access to port 554.
Alternatively, IT managers could take more drastic steps.
“As a last measure, QuickTime should be uninstalled until patches are available,” the alert said.
Related Posts: On this day...
- Cops Ask Congress for Your Text Messages - 2012
- DB Cooper case "solved" - 2011
- Ron Paul Makes Special Request Of Wikileaks - 2010
- WikiLeaks' Swiss host says no to French and US government pressure - 2010
- Why yes, of COURSE, I've read it - 2009
- Recession jeopardizes corporate philanthropy - 2008
- Holiday Gift Guide: Nonfiction Books - 2008