Quicktime 7.6.9 (Leopard) 軟體資訊交流 Mac

winXmac軟體社群 Mac 影音轉檔 Apple Inc 免費軟體 Rate 80

QuickTime Player for Mac,軟體教學,軟體下載,軟體社群,Windows軟體,Mac軟體

Quicktime 7.6.9 (Leopard) Mac


內置媒體播放器的強大多媒體技術 QuickTime Player for Mac 可讓您以各種文件格式查看互聯網視頻,高清電影預告片和個人媒體。它可以讓您以極高的品質享受它們。

什麼是 QuickTime Player?

它是一個多媒體平台.
來自您的數碼相機或手機的視頻。在 Mac 或 PC 上播放電影網站上的媒體剪輯。無論你在看什麼或在哪裡觀看,QuickTime 技術都是可能的.

它是一個複雜的媒體播放器.
QuickTime Player 具有簡單的設計和易​​於使用的控制,讓你觀看的一切更加愉快。它乾淨整潔的界面從不妨礙你正在觀看的東西。想通過電影加速還是放慢速度?一個方便的滑塊可以讓您將播放設置為正常速度的 1 / 2 倍至 3 倍。而且您可以快速搜索各個電影幀.

它是先進的視頻技術.
QuickTime 採用了先進的視頻壓縮技術 H.264,可以使用更少的帶寬和存儲空間來提供清晰,清晰的高清視頻。所以,無論您觀看電影或視頻,您都將體驗到原始的視頻質量.

它是一種靈活的文件格式.
QuickTime 讓您可以在數字媒體上做更多的事情。使用 QuickTime 7 Pro,您可以將文件轉換為不同的格式,並記錄和編輯您的工作。第三方插件將 QuickTime 技術擴展到許多不同的方向。而 QuickTime 流媒體解決方案可讓您通過 Internet 流媒體.

還提供:下載適用於 Windows 的 QuickTime 播放器

檔案版本 Quicktime 7.6.9 (Leopard)
檔案名稱 QuickTime769_Leopard.dmg
檔案大小 68.62 MB
系統 Mac OS X Leopard
軟體類型 免費軟體
作者 Apple Inc
更新日期 http://www.apple.com/quicktime/
軟體類型 2010-12-08
更新日誌

What's new in this version:

- CVE-ID: CVE-2010-3787
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution
- Description: A heap buffer overflow exists in QuickTime's handling of JP2 images. Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Nils of MWR InfoSecurity, and Will Dormann of the CERT/CC, for reporting this issue.

- CVE-ID: CVE-2010-3788
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution
- Description: An uninitialized memory access issue exists in QuickTime's handling of JP2 images. Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of JP2 images. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Damian Put and Procyun, working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3789
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted avi file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue is in QuickTime's handling of avi files. Viewing a maliciously crafted avi file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of avi files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Damian Put working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3790
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of movie files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Honggang Ren of Fortinet's FortiGuard Labs for reporting this issue.

- CVE-ID: CVE-2010-3791
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A buffer overflow exists in QuickTime's handling of MPEG encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3792
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A signedness issue exists in QuickTime's handling of MPEG encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of MPEG encoded movie files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3793
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of Sorenson encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of Sorenson encoded movie files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative, and Carsten Eiram of Secunia Research for reporting this issue.

- CVE-ID: CVE-2010-3794
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution
- Description: An uninitialized memory access issue exists in QuickTime's handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3795
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted GIF image may lead to an unexpected application termination or arbitrary code execution
- Description: An uninitialized memory access issue exists in QuickTime's handling of GIF images. Viewing a maliciously crafted GIF image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3800
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted PICT file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of PICT files. Viewing a maliciously crafted PICT file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of PICT files. Credit to Moritz Jodeit of n.runs AG and Damian Put, working with TippingPoint's Zero Day Initiative, and Hossein Lotfi (s0lute), working with VeriSign iDefense Labs for reporting this issue.

- CVE-ID: CVE-2010-3801
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to Damian Put working with TippingPoint's Zero Day Initiative, and Rodrigo Rubira Branco from the Check Point Vulnerability Discovery Team for reporting this issue.

- CVE-ID: CVE-2010-3802
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of QTVR movie files. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-1508
- Available for: Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A heap buffer overflow exists in QuickTime's handling of Track Header (tkhd) atoms. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. This issue does not affect Mac OS X systems. Credit to Moritz Jodeit of n.runs AG, working with TippingPoint's Zero Day Initiative, and Carsten Eiram of Secunia Research for reporting this issue.

- CVE-ID: CVE-2010-0530
- Available for: Windows 7, Vista, XP SP2 or later
- Impact: A local user may have access to sensitive information
- Description: A filesystem permission issue exists in QuickTime. This may allow a local user to access the contents of the "Apple Computer" directory in the user's profile, which may lead to the disclosure of sensitive information. This issue is addressed through improved filesystem permissions. This issue does not affect Mac OS X systems. Credit to Geoff Strickler of On-Line Transaction Consultants for reporting this issue.

- CVE-ID: CVE-2010-4009
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: An integer overflow exists in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to Honggang Ren of Fortinet's FortiGuard Labs for reporting this issue.

檔案下載 檔案下載
  • QuickTime Player for Mac Screenshot 1QuickTime Player for Mac Screenshot 2QuickTime Player for Mac Screenshot 3QuickTime Player for Mac Screenshot 4