Ok.. you have drawn me in to make another post due to your very very selective reading and lack on knowledge. The security issues have been around for years, but now they are on the increase. If you had followed the history of events, then you would know that both QuickTime, Microsoft and Adobe (flash) have been issuing updates to try and stem the tide. The excerts below state the problems, and according to you, US Goverment, Adobe, Microsoft, Apple and Specialist technitions are all lying and paranoid! BTW, It is quoted that midi and other sound forms are all vulnerable.. and these are converted into MP3's when compressions are applied with movie files, you will also notice quotes from Apple regarding picture files.. again changed into JPG's when compression added.
http://threatcenter.blogspot.com/2007/03/quicktime-security-fixes.htmlTuesday, March 6, 2007
QuickTime Security Fixes
Apple has released updates to its QuickTime software that include security fixes for both the Windows and Mac versions. We consider this critical as the number of people running QuickTime software is large. Here's a summary of the issues (full details can be found on Apple's site):
Viewing a maliciously-crafted 3GP file may lead to an application crash or arbitrary code execution (OS: Windows Vista/XP/2000)
Viewing a maliciously-crafted MIDI file may lead to an application crash or arbitrary code execution (OS: Mac OS X and Windows Vista/XP/2000)
Viewing a maliciously-crafted Quicktime movie file may lead to an application crash or arbitrary code execution (OS: Mac OS X and Windows Vista/XP/2000)
Viewing a maliciously-crafted PICT file may lead to an application crash or arbitrary code execution (OS: Mac OS X and Windows Vista/XP/2000)
Opening a maliciously-crafted QTIF file may lead to an application crash or arbitrary code execution (OS: Mac OS X and Windows Vista/XP/2000)
----------------------------------
http://threatcenter.blogspot.com/2007/07/adobe-flash-browser-plugin-high-risk.html Tuesday, July 17, 2007
Adobe Flash Browser Plugin High Risk Vulnerability
Yesterday, Adobe announced a vulnerability in its flash player that could be exploited to run arbitrary code. This vulnerability is cross browser and cross platform and the vulnerable software is installed by default on all recent copies of Windows and OS X.
All users who allow flash content in their browsers are at risk.
This morning we saw the first proof-of-concept exploit, which we fully expect to be the tip of the iceberg. Its likely that we'll see mass exploitation in the next few days..
To protect yourself, the best thing to do is to upgrade your flash plugin to 9.0.47.0 or later. If you use FireFox, the NoScript plugin will prevent flash content from running unless you specifically trust the source or grant it temporary permission. NoScript can be annoying, but its an extremely valuable tool in combatting malicious websites.
And, of course, make sure you're running gateway and desktop antivirus and intrusion prevention products that are up-to-date.
We'll keep you posted as we see more.
------------------------------------------
http://threatcenter.blogspot.com/2007/07/threat-level-raised.htmlTuesday, July 17, 2007
Threat Level Raised
We're raising the threat level in response to the Adobe vulnerability. At this point, the Threat Level is in a cautionary area. We'll raise it again if we start seeing wide-spread exploitation.
-------------------------------------
http://software.silicon.com/malware/0,3800003100,39164505,00.htmHackers coveting online video - McAfee
Media malware is next big thing...
Tags: video-sharing, video sharing, video, mcafee
By Tom Espiner
Published: Monday 4 December 2006
Show related
articlesSecurity vendor McAfee has predicted the increasing popularity of video on the web will make it a future target for hackers.
The use of video formats on social-networking sites will attract malware writers, the company claims. As people become more reluctant to open email attachments from anonymous sources, hackers will target users who open media files instead.
The functionality of online video, which includes pop-up ads and URL redirects, will become "ideal tools of destruction for malware writers", McAfee claimed in a statement. It said: "As video-sharing networks on the web proliferate, the potential capture of a large audience will incite malware writers to exploit these channels for monetary gain.
"In combination, these issues make malicious coders likely to achieve a high degree of effectiveness with media malware."
The so-called W32/Realor worm, discovered in early November 2006, launches malicious websites without user interaction, potentially exposing users to pass-capture malware on the sites. The so-called Exploit-WinAmpPLS installs spyware but requires user interaction.
McAfee anticipates that businesses will prefer users not to download video onto work PCs.
McAfee security analyst Greg Day said: "A lot of companies currently have verbal policies [prohibiting video downloads]. We expect more formal enforcement to come into place."
Tom Espiner writes for ZDNet UK
---------------------------------
http://www.adobe.com/devnet/security/security_zone/mpsb05-07.htmlSecurity Bulletin
MPSB05-07 Flash Player 7 Improper Memory Access Vulnerability
Summary A vulnerability in Macromedia Flash Player 7 has been identified that could allow the execution of arbitrary code.
SolutionThe current version of Macromedia Flash Player (8.0.22.0) contains a fix for the vulnerability. Users who have already upgraded to Flash Player 8 are not affected by this issue. Macromedia recommends all Flash Player 7 and earlier users upgrade to this new version, which can be downloaded from the Macromedia Player Download Center. Updated versions of Flash Player 7 for Linux and Solaris, which contain a fix for the vulnerability, are also available from the Macromedia Player Download Center. For customers with operating systems that do not support Flash Player 8 (Microsoft Windows 95, Microsoft Windows NT, or classic Macintosh operating systems), please refer to the Flash Player 7 update TechNote.
Affected Software VersionsFlash Player 7.0.53.0 and earlier
Severity RatingMacromedia categorizes this as a critical update and recommends affected users update to Flash Player 8.
DetailsFlash Player 8 (8.0.22.0) and Flash Player 7 update (7.0.61.0 or 7.0.60.0) address a security vulnerability in previous versions of Flash Player, which could lead to the potential execution of arbitrary code.
There was a problem with bounds validation for indexes of certain arrays in Flash Player 7 and earlier, thus leaving open the possibility that a third party could inject unauthorized code that would have been executed by Flash Player.
AcknowledgementsMacromedia would like to thank eEye Digital Security and Sec Consult for reporting these vulnerabilities and for working with us to help protect our customers' security.
-----------------------------
http://www.adobe.com/devnet/security/security_zone/apsb06-03.htmlAPSB06-03 Flash Player Update to Address Security Vulnerabilities
Originally posted: March 14, 2006
CVE IdentifierCVE-2006-0024
Summary Critical vulnerabilities have been identified in Flash Player that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system. A malicious SWF must be loaded in Flash Player by the user for an attacker to exploit these vulnerabilities. Users are recommended to update to the most current version of Flash Player available for their platform.
SolutionAdobe recommends all Flash Player 8.0.22.0 and earlier users upgrade to the new version 8.0.24.0, which can be downloaded from the Player Download Center. For customers that cannot upgrade to Flash Player 8, please refer to the Flash Player 7 update TechNote.
Adobe provides a free license for redistributing Flash Player on company intranets, or with software product or services. For more information and to apply for a license, use the online application.
May 9, 2006 Update
For Windows users who currently have Flash Player 6.0.79 or earlier installed on Microsoft Windows XP Service Pack 1, Windows XP Service Pack 2, Windows 98, Windows 98 SE, or Windows Millennium Edition, Microsoft is providing an updated Flash Player 6 (6.0.84.0) through Windows Update. For more information, see Microsoft Security Bulletin MS06-020.
If you are unable to follow Adobe’s guidance or cannot move to a more recent version of Flash Player, please contact the Adobe Security Team at [email=PSIRT@adobe.com]PSIRT@adobe.com[/email] for guidance around this update.
Adobe recommends Breeze customers upgrade to Breeze Meeting Add-In version 5.1 SP1, which can be downloaded via the following links:
Breeze Meeting Add-In Version 5.1 SP1 for Windows
Breeze Meeting Add-In Version 5.1 SP1 for Macintosh OS X
Shockwave Player includes the Flash Asset Xtra. Adobe recommends Shockwave Player customers upgrade to Shockwave Player 10.1.1, which updates the Flash Asset Xtra version number to 8.0.24.0.
Affected Software Versions Flash Player versions 8.0.22.0 and earlier
To verify the Flash Player version number, access the About Flash Player page, or right-click on Flash content and select About Macromedia Flash Player from the menu. If you use multiple browsers, perform the check, and the installation for each browser.
Breeze Meeting Add-In Version 5.1 and earlier
To verify the Breeze Meeting Add-In version number, enter a meeting room and select Help>About Breeze Meeting.
Shockwave Player version 10.1.0.11 and earlier
To verify the Shockwave Player version number, access the Test Shockwave Player page.
Flash Debug Player version 7.0.14.0 and earlier
To verify the Flash Player version number, access the About Flash Player page , or right-click on Flash content and select About Macromedia Flash Player from the menu. If you use multiple browsers, perform the check, and the installation for each browser.
Severity RatingAdobe categorizes this as a critical update and recommends affected users update to Flash Player 8.0.24.0.
DetailsFlash Player 8 update (8.0.24.0), and Flash Player 7 update (7.0.63.0) address security vulnerabilities in previous versions of Flash Player, which could lead to the potential execution of arbitrary code. These vulnerabilities could be accessed through content delivered from a remote location via the user’s web browser, email client, or other applications that include or reference the Flash Player. Updated versions of Flash Player 7 for Linux and Solaris, which contain fixes for these vulnerabilities, are also available from the Adobe Player Download Center.
--------------------------------------
http://www.microsoft.com/technet/security/Bulletin/ms06-020.mspxMicrosoft Security Bulletin MS06-020
Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution (913433)
Published: May 9, 2006 | Updated: November 15, 2006
Version: 1.1
Summary
Who should read this document: Customers who use Microsoft Windows
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Recommendation: Customers should apply the update immediately.
Security Update Replacement: None.
Caveats: This bulletin is for customers using Macromedia Flash Player from Adobe version 6 or earlier. Customers that have followed the guidance in Adobe Security Bulletin APSB06-03 are not at risk from the vulnerability.
Vulnerable versions of Macromedia Flash Player from Adobe are included with Windows XP, Windows XP Professional x64 Edition, and Internet Explorer 6 Service Pack 1 when installed on Windows ME, Windows 98, and Windows 98 Second Edition. Other versions of Windows are not affected or not supported by this security update. Customers with Flash Player installed on other versions of the operating system or customers who have upgraded to Flash Player 7 or higher are encouraged to follow the guidance in the Adobe Security Bulletin APSB06-03.
Microsoft Knowledge Base Article 913433 documents the currently known issues that customers may experience when they install this security update. The article also documents recommended solutions for these issues. For more information, see Microsoft Knowledge Base Article 913433.
--------------------------------
http://www.scmagazine.com/us/alerts/featuredarticles/40069/hot-not-local-buffer-overflow-vulnerabilitiesBuffer overflow vulnerabilities have plagued IT security professionals for some time, and some of the most notorious worms -- including Code Red, MSBlaster, SQL Slammer, and the infamous Morris worm that struck in 1988 -- all were made possible by buffer overflows.
These flaws arise in software when developers fail to properly put in place checks for strings that are placed in memory. Without such checks, attackers can send data to the buffer that goes beyond the intended buffer length and causes instability. The extra data then can overwrite nearby memory locations, which can be program data, variables, and other memory buffers. Attackers also can insert malicious applications into the system. That's why buffer overflows are so sought after by attackers. An application with a buffer overflow error vulnerability can be used to crash the application, produce false results, and enable the attacker to gain access to system resources, install malware, spyware, viruses, trojans, pop-up ads and even clandestinely steal information.
For many years, local vulnerabilities were considered to be less critical than remotely exploitable vulnerabilities. That's because local vulnerabilities often require the end user or system to take some type of action to be successfully compromised. But today, with nearly every computing device connected and interacting with the internet, it's much easier to entice users to fall victim. They can be attacked via websites, email attachments, and instant messaging file exchanges. And the problem means that common file formats, such as all Microsoft Office applications, Adobe PDF files, and other near ubiquitous formats, including those of many image and video files, can be used by attackers. This also presents a clear danger from core operating system components, as witnessed by the recent animated cursor and help file vulnerabilities.
One hope for a long-term solution is the No Execute, or NX technology, being built into Intel and AMD processors and the Windows operating system. But only time will tell if this technology can eradicate one of the longest standing and easily exploitable classes of vulnerabilities.
-Amol Sarwate is director of Qualys' vulnerability research lab.
-------------------------------
http://www.us-cert.gov/cas/alerts/SA07-193A.htmlDescription
QuickTime prior to version 7.2 has multiple image and media file handling vulnerabilities that could allow an attacker to run malicious programs on your computer. This could happen by visiting a malicious web site. Upgrading to Apple QuickTime version 7.2 will correct these vulnerabilities.
Note that QuickTime ships with Apple iTunes.
For more technical information, see US-CERT Technical Alert TA07-193A and the Apple QuickTime Security Update.
---------------------------------
Some articles quoted YouTube.. but so I don't get misquoted yet again, perhaps this quote suits you better?
McAfee claimed in a statement. It said: "As video-sharing networks on the web proliferate, the potential capture of a large audience will incite malware writers to exploit these channels for monetary gain."
For the most part, I don't care what you think as you clearly have some notion that all is happy in the garden.. but unless you now wish to call all these people/experts above scaremongers, paranoid, liars etc etc... accept you are wrong. As I stated previously, having the latest updates, simply means that you are covered for the historic vulnerabilities that were know when the patches were written, and this has been going on for some years and is ongoing.
QUOTE: One hope for a long-term solution is the No Execute, or NX technology, being built into Intel and AMD processors and the Windows operating system. But only time will tell if this technology can eradicate one of the longest standing and easily exploitable classes of vulnerabilities.
-Amol Sarwate is director of Qualys' vulnerability research lab. :UNQUOTE
I/We produce media for the internet and SL, we make every frame and the compiled media is screened several times. We also host on our own secure servers. Any media streamed into SL via our servers are shown on the Silver Stream Network which is supplied over SSL's which also incorporate firewalls and virus checkers, in addition, each screen/player is coded for security. We do NOT use any form of public host or file sharing facilities. Despite the vulnerabilities of the players/plugins none of our media can cause the 'exploits' mentioned. SL's cleint uses the QuickTime pluggin and cannot play flash media above version 3.