Frequently Asked Questions (FAQ) about Apple ending support for QuickTime for Windows
- Solution ID: 1114032
- Last Updated: Oct. 17, 2017 4:54 AM (PST)
- Applies to: Antivirus+ Security - 2017;2018;2015, 2016;Internet Security - 2017;Internet Security - 2018;Internet Security - 2016, Internet Security - 2015;Maximum Security - 2017;Maximum Security - 2018;Maximum Security - 2015, Maximum Security - 2016;Premium Security - 2017;Premium Security - 2018;Premium Security - 2015, Premium Security - 2016;
- FAQ | QuickTime for Windows
Get answers to frequently asked questions about Apple ending support for QuickTime for Windows.
Below are frequently asked questions (FAQs) about Apple ending support for QuickTime for Windows. Click on a question to view the answer:
QuickTime for Windows is an extensible multimedia framework developed by Apple Inc., capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity.
Yes. It is a valid email from us to inform you about the possible risk of having QuickTime for Windows on your computer.
Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation.
Everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible due to the following reason:
Apple will no longer be issuing security updates for the product on the Windows Platform and recommend users uninstall it.
Note: This does not apply to QuickTime on Mac OSX.
- Apple is no longer providing security updates for QuickTime on Windows. Thus, vulnerabilities will never be patched.
Trend Micro Zero Day Initiative has just released advisories for two vulnerabilities found in QuickTime for Windows in accordance with the Zero Day Initiative’s Disclosure Policy for when a vendor does not issue a security patch for a disclosed vulnerability. You can check on it below.
- ZDI-16-241 Apple QuickTime moov Atom Heap Corruption Remote Code Execution Vulnerability
- ZDI-16-242 Apple QuickTime Atom Processing Heap Corruption Remote Code Execution Vulnerability
These vulnerabilities would require a user to visit a malicious web page or open a malicious file to exploit them. And both vulnerabilities would execute code in the security context the QuickTime player, which in most cases would be that of the logged on user.
While there have not been any reported cases of attacks through this QuickTime vulnerability, it is still highly advised to uninstall the program. QuickTime also joins Microsoft Windows XP and Oracle Java 6 as software that are no longer being updated to fix vulnerabilities found in the program – subjecting them to ever-increasing risk as more unpatched vulnerabilities are discovered to be affecting it.
Computer systems running unsupported software are exposed to elevated cybersecurity dangers, such as increased risks of malicious attacks or electronic data loss. Exploitation of QuickTime for Windows vulnerabilities could allow remote attackers to take control of affected systems.
For instructions on how to uninstall QuickTime for Windows, refer to this Apple Knowledge Base article: QuickTime for Windows on the Apple Uninstall QuickTime.
You may contact Apple support at support.apple.com.