-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0043
                              QuickTime 7.7.9
                              8 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           QuickTime
Publisher:         Apple
Operating System:  Windows 7
                   Windows Vista
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-7117 CVE-2015-7092 CVE-2015-7091
                   CVE-2015-7090 CVE-2015-7089 CVE-2015-7088
                   CVE-2015-7087 CVE-2015-7086 CVE-2015-7085

Original Bulletin: 
   https://support.apple.com/en-au/HT205638

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2016-01-07-1 QuickTime 7.7.9

QuickTime 7.7.9 is now available and addresses the following:

QuickTime
Available for:  Windows 7 and Windows Vista
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues existed in QuickTime.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-7085 : an anonymous researcher
CVE-2015-7086 : an anonymous researcher
CVE-2015-7087 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7088 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7089 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7090 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7091 : Pedro Ribeiro (pedrib@gmail.com <mailto:pedrib@gmail.com>) of Agile Information
Security
CVE-2015-7092 : Jaanus Kp Clarified Security working with HP's Zero
Day Initiative
CVE-2015-7117 : Ryan Pentney and Richard Johnson of Cisco Talos

- -----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org <https://gpgtools.org/>
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=4BZX
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=azx/
-----END PGP SIGNATURE-----