[LACNIC/Seguridad] Quicktime Vulnerability (CVE-2012-0671)

Rodrigo Rubira Branco (BSDaemon) rodrigo en kernelhacking.com
Mar Mayo 15 17:49:29 BRT 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dear All,

Today Apple announced a patch for another vulnerability I discovered,
this time in Quicktime (CVE-2012-0671).

This vulnerabilities allow remote code execution and affects roughly
half of all internet users (statistics on number of users who have the
Quicktime plugin in the browser).

I'm sending the information to this mailing list in order to again,
prove my integrity after hearing rumors by a coward Brazilian
institution that is spreading lies about me in my back.



Best Regards,

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk+ywVkACgkQRpuC3B/O3qG5YwCfeRZkCrgWA69SCUtBaPs+7b1i
k4cAn0m7VOgJaOSn431sEdT2a88u7W2L
=+DWZ
-----END PGP SIGNATURE-----



Más información sobre la lista de distribución Seguridad