Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced

0 views
Skip to first unread message

Gerald309

unread,
Apr 14, 2016, 8:32:24 PM4/14/16
to bluecollar...@googlegroups.com, bluecollar...@yahoogroups.com
Fwd: TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced


-------- Forwarded Message --------
Subject: TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
Date: Thu, 14 Apr 2016 16:12:54 -0500
From: US-CERT <US-...@ncas.us-cert.gov>
Reply-To: US-...@ncas.us-cert.gov
To: gera...@gmail.com


U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

04/14/2016 03:48 PM EDT

Original release date: April 14, 2016

Systems Affected

Microsoft Windows with Apple QuickTime installed

Overview

According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1]

Description

All software products have a lifecycle. Apple will no longer be providing security updates for QuickTime for Windows. [1]

The Zero Day Initiative has issued advisories for two vulnerabilities found in QuickTime for Windows. [2] [3]

Impact

Computer systems running unsupported software are exposed to elevated cybersecurity dangers, such as increased risks of malicious attacks or electronic data loss. Exploitation of QuickTime for Windows vulnerabilities could allow remote attackers to take control of affected systems.

Solution

Computers running QuickTime for Windows will continue to work after support ends. However, using unsupported software may increase the risks from viruses and other security threats. Potential negative consequences include loss of confidentiality, integrity, or availability of data, as well as damage to system resources or business assets. The only mitigation available is to uninstall QuickTime for Windows. Users can find instructions for uninstalling QuickTime for Windows on the Apple Uninstall QuickTime page. [4]

References

Revision History

  • April 14, 2016: Initial Release

This product is provided subject to this Notification and this Privacy & Use policy.


A copy of this publication is available at www.us-cert.gov. If you need help or have questions, please send an email to in...@us-cert.gov. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-...@ncas.us-cert.gov to your address book.
OTHER RESOURCES:
Contact Us | Security Publications | Alerts and Tips | Related Resources
STAY CONNECTED:
Sign up for email updates

This email was sent to gera...@gmail.com using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSec...@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005 
MOBILES: http://androidtableteer.com/
http://pdamobilecafe.wordpress.com/ 
Alerts: pdamobilecafemobile...@yahoogroups.com 
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15


Reply all
Reply to author
Forward
0 new messages