{"id":135,"date":"2007-01-23T14:06:52","date_gmt":"2007-01-23T22:06:52","guid":{"rendered":"http:\/\/37prime.wordpress.com\/2007\/01\/23\/apple-releases-security-update-2007-001\/"},"modified":"2007-01-23T14:06:52","modified_gmt":"2007-01-23T22:06:52","slug":"apple-releases-security-update-2007-001","status":"publish","type":"post","link":"https:\/\/37prime.com\/news\/2007\/01\/23\/apple-releases-security-update-2007-001\/","title":{"rendered":"Apple Releases &#8220;Security Update 2007-001&#8221;"},"content":{"rendered":"<p>Apple releases &#8220;Security Update 2007-001&#8221; to address <a href=\"http:\/\/www.apple.com\/quicktime\/\" target=\"_blank\">QuickTime 7.1.3<\/a> vulnerability.<br \/>\n<a href=\"http:\/\/www.info.apple.com\/kbnum\/n61798\" target=\"_blank\">http:\/\/www.info.apple.com\/kbnum\/n61798<\/a><br \/>\nThe update is available for <a href=\"http:\/\/www.apple.com\/quicktime\/\" target=\"_blank\">QuickTime 7.1.3<\/a> on Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.8, Mac OS X Server v10.4.8, Windows XP\/2000.<\/p>\n<p><a href=\"http:\/\/www.apple.com\/support\/downloads\/securityupdate2007001universal.html\" target=\"_blank\">Security Update 2007-001 (Mac OS X 10.4.8 Universal)<\/a> &#8211; <a href=\"http:\/\/wsidecar.apple.com\/cgi-bin\/nph-reg3rdpty2.pl\/product=12686&amp;cat=1&amp;platform=osx&amp;method=sa\/SecUpd2007-001Ti.dmg\">4.9MB<\/a><br \/>\n<a href=\"http:\/\/www.apple.com\/support\/downloads\/securityupdate2007001panther.html\" target=\"_blank\">Security Update 2007-001 (Mac OS X 10.3.9)<\/a> &#8211; <a href=\"http:\/\/wsidecar.apple.com\/cgi-bin\/nph-reg3rdpty2.pl\/product=12687&amp;cat=1&amp;platform=osx&amp;method=sa\/SecUpd2007-001Pan.dmg\">2.4MB<\/a><\/p>\n<p>From Apple Support:<\/p>\n<blockquote><p><em>Security Update 2007-001 is recommended for all users and improves QuickTime security.<\/em><\/p>\n<p><em>Description: A buffer overflow exists in QuickTime&#8217;s handling of RTSP URLs. By enticing a user to access a maliciously-crafted RTSP URL, an attacker can trigger the buffer overflow, which may lead to arbitrary code execution. A QTL file that triggers this issue has been published on the Month of Apple Bugs web site (MOAB-01-01-2007). This update addresses the issue by performing additional validation of RTSP URLs.<\/em><\/p><\/blockquote>\n<p>The update can be obtained through Apple Software Updates (Mac OS X and Windows XP\/2000) or <a href=\"http:\/\/www.apple.com\/support\/downloads\/\" target=\"_blank\">Apple Support Downloads<\/a> page.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/37prime.com\/securityupdate-2007-001.png\" alt=\"Apple Security Update 2007-001\" \/><\/p>\n<p><a href=\"http:\/\/www.apple.com\/support\/downloads\/\" target=\"_blank\">http:\/\/www.apple.com\/support\/downloads\/<\/a><\/p>\n<p><!--more--> Apple also releases Xserve RAID Admin Tools 1.5.1 for Mac OS X 10.2.8 or later.<br \/>\nFrom Apple Support:<\/p>\n<blockquote><p><em>The Xserve RAID Admin Tools 1.5.1 Update addresses overall reliability of the RAID Admin software and Xserve RAID firmware.<\/em><\/p><\/blockquote>\n<p><a href=\"http:\/\/www.apple.com\/support\/downloads\/xserveraidadmintools151.html\" target=\"_blank\">Xserve RAID Admin Tools 1.5.1<\/a> &#8211; <a href=\"http:\/\/wsidecar.apple.com\/cgi-bin\/nph-reg3rdpty2.pl\/product=12765&amp;cat=59&amp;platform=osx&amp;method=sa\/RAID_Admin151.dmg\">7.9MB<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple releases &#8220;Security Update 2007-001&#8221; to address QuickTime 7.1.3 vulnerability. http:\/\/www.info.apple.com\/kbnum\/n61798 The update is available for QuickTime 7.1.3 on Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.8, Mac OS X Server v10.4.8, Windows XP\/2000. Security Update 2007-001 (Mac OS X 10.4.8 Universal) &#8211; 4.9MB Security Update 2007-001 (Mac OS X &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/37prime.com\/news\/2007\/01\/23\/apple-releases-security-update-2007-001\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Apple Releases &#8220;Security Update 2007-001&#8221;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[946],"tags":[403,404,1664,1931,934,2511,2648,936,3131,3216],"class_list":["post-135","post","type-post","status-publish","format-standard","hentry","category-announcements","tag-applications","tag-apps","tag-itunes","tag-mac-os-x","tag-microsoft","tag-resources","tag-security","tag-tech","tag-vista","tag-windows"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pcNtU-2b","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":0,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts\/135\/revisions"}],"wp:attachment":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/media?parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/categories?post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/tags?post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}