-
All replies
-
Helpful answers
-
Apr 18, 2016 4:15 PM in response to Derek_m_gby FoxFifth,While it is possible that QuickTime was involved, there are currently no known attacks that have exploited the reported vulnerability in QuickTime in Windows.
Whether or not QuickTime was involved, if you are having a malware issue in Windows you will be more likely to get advice in a Microsoft forum such as http://answers.microsoft.com/en-us
-
-
Apr 20, 2016 8:06 AM in response to turingtest2by Ochimo,Do not be mislead. two new and critical zero day vulnerabilities in the software, ZDI-16-241 and ZDI-16-242
-
Apr 20, 2016 8:41 AM in response to Ochimoby turingtest2,Yes, I am aware of the information about these vulnerabilities, but I've not seen evidence of an actual exploit in the wild. The advice would be to remove QuickTime for Windows if installed. On the other hand I'm not sure anyone has enough information to declare:
My computer has evidently been compromised through malware using QuickTime
How are we to know that QuickTime was the attack vector?
What is this auto-repair loop to which the OP refers?
tt2
-
Apr 20, 2016 3:13 PM in response to Derek_m_gby Klaus1,RIP QuickTime for Windows. Apple is "deprecating support" for the application, and will no longer patch security flaws in the software.
In this regard, QuickTime for Windows now joins Microsoft Windows XP and Oracle Java 6 as software that is no longer being updated to fix vulnerabilities, and subject to ever-increasing risk as more and more unpatched vulnerabilities are found affecting it.
So, Windows users should uninstall Quicktime. How to do so is detailed here:
https://support.apple.com/en-us/HT205771
Mac OS users should not do so as the security risks that have prompted this do not affect the Apple OS.