WEVA International
Wedding and Event Videographers Association International
Find a Videographer
About WEVA
Brides Guide
Join WEVA
Join WEVA
MPV Program
Association News
Industry News
WEVA Honorees
Forums
Member Services
Member Benefits
Member Links
Industry Resources
Request Information
Contact Us
 

Media Players Hit by Security Glitch
April 04, 2003

Reston, VA - RealNetworks and Apple Computer are advising users of their media players to update the software as a result of security problems described by both companies.

RealNetworks warned in an advisory that a security flaw affecting RealOne Player and RealPlayer 8 can result in corruption when creating a specifically-corrupted PNG (Portable Network Graphics) file. It is possible to execute arbitrary code on a user's machine, the company reported.

The company says it is not aware of an actual breach of the software through the flaw.

Meanwhile a risk with Apple QuickTime was also publicized, one that could allow destructive code to be loaded into vulnerable systems.

The vulnerability is Windows specific (Mac users are immune) and affects QuickTime Player versions 5.x and 6.0 on Windows. Users are encouraged to upgrade to QuickTime 6.1 for Windows, which addresses the vulnerability.


RealNetwork's security page can be found
here.

Apple's security page can be found here.



For more information, visit
www.idefence.com/current


# # #

For a listing of all the WEVA News Stories...
Click Here



5 most current stories:
06-13-2016Vitec Videocom Partners with Global Finance Group to Offer New Financing Opportunities for Small Businesses and Freelancers
10-28-2015Discover New Industry Developments @WEVAnews on Twitter
08-07-2015Register for Alex Buono's New 32-City Tour - Discount for WEVA Members
06-05-2015Skype for Web (Beta) Opens to Everyone in US and UK
05-28-2015Google Introduces Free Unlimited Storage for Photos and 1080p Video

Search:
 

Copyright © WEVA International. All rights reserved.
5020 Clark Road #345, Sarasota, FL 34233
General Information: e-mail [email protected] Problem using this website: e-mail [email protected]