First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Apple issues major patch updates for QuickTime, iPod touch
- — 11 September, 2008 08:11
Apple Tuesday patched 20 security vulnerabilities in its QuickTime media player, iTunes music store client, iPod touch device and Bonjour network software. More than half of the bugs could let hackers hijack computers or the iPod.
In four separate security updates, Apple fixed nine flaws in QuickTime, seven in the iPod touch's software and two each in iTunes and Bonjour for Windows.
Danish vulnerability tracker Secunia rated the QuickTime and iPod touch bugs as "highly critical," its second-highest threat ranking. The company pegged the Bonjour and iTunes flaws as "less critical," the second-lowest ranking.
Tuesday's update to QuickTime 7.5.5 was Apple's fifth this year for the problem-plagued media player. Apple has plugged a total of 30 holes in the program in 2008, most recently in early June.
Five of the nine vulnerabilities affect both the Mac and Windows versions, while four affect only QuickTime for Windows XP and Vista. Apple described eight of the bugs as allowing "arbitrary code execution," a phrase it uses to describe its most serious threats. Unlike vendors such as Microsoft and Oracle, Apple doesn't rank the bugs it fixes with a scoring or labeling system.
The patches address vulnerabilities in how QuickTime parses PICT images, QTVR (QuickTime Virtual Reality) files, QuickTime movies, H.264-encoded movies and Indeo-encoded video, according to Apple's accompanying advisory. Similar such flaws were also patched in June, when Apple quashed different bugs in PICT parsing and Indeo video handling.
A majority of the vulnerabilities were reported to Apple via bug bounty programs run by 3Com's TippingPoint and VeriSign's iDefense research arms.
Of the flaws fixed in the iPod touch, Bonjour for Windows and iTunes, the most serious were patches for the iPod's open-source FreeType font engine and its Safari Web browser. The four vulnerabilities in those two programs, said Apple, could be used by attackers to introduce rogue code, and possibly compromise the device. The iPod touch, which was revamped just yesterday, is an iPhone lookalike that can connect to the Internet via Wi-Fi.