QuickTime Player for Mac、ソフトウェア教育、ソフトウェアダウンロード、ソフトウェアコミュニティ、Windowsソフトウェア、Macソフトウェア

Quicktime 7.6.9 (Leopard)

メディアプレーヤー内蔵の強力なマルチメディアテクノロジーである QuickTime Player for Mac では、インターネットビデオ、HD 映画予告編、パーソナルメディアを幅広いファイル形式で視聴できます。

は QuickTime Player とは何ですか?

はマルチメディアプラットフォームです.
デジタルカメラや携帯電話からのビデオです。あなたの Mac または PC 上の映画。ウェブサイトのメディアクリップ。あなたが見ている場所や見ている場所にかかわらず、QuickTime テクノロジーはすべての可能性を生み出します.

洗練されたメディアプレーヤーです.
QuickTime Player はシンプルなデザインと使いやすいコントロールを備えており、 。そのきれいで整然としたインターフェースは、あなたが見ているものを決して邪魔しません。ムービーをスピードアップしたり、遅くなるようにしたいですか?便利なスライダーを使用すると、通常の速度の 1 / 2x から 3x に再生を設定できます。また、個々のムービーフレームをすばやく検索することができます.

高度なビデオ技術.
QuickTime は、H.264 と呼ばれる高度なビデオ圧縮技術を採用しているため、帯域幅とストレージを削減して鮮明な HD ビデオを再生できます。そのため、映画やビデオを見るときはいつでも元のビデオ品質を体験できます.

柔軟なファイル形式です.
QuickTime を使用すると、デジタルメディアをさらに活用できます。 QuickTime 7 Pro を使用すると、ファイルをさまざまなフォーマットに変換し、作品を録画して編集することができます。サードパーティのプラグインは、QuickTime テクノロジをさまざまな方向に拡張します。また QuickTime ストリーミングソリューションを使用すると、インターネット上でメディアをストリーミングできます.

Also Available:Windows 用 QuickTime Player をダウンロードします.

ファイルのバージョン Quicktime 7.6.9 (Leopard)
ファイル名 QuickTime769_Leopard.dmg
ファイルサイズ 68.62 MB
オペレーティングシステム Mac OS X Leopard
ソフトウェアタイプ Freeware
著者 Apple Inc
更新日 http://www.apple.com/quicktime/
更新時間 2010-12-08
ログを更新する

What's new in this version:

- CVE-ID: CVE-2010-3787
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution
- Description: A heap buffer overflow exists in QuickTime's handling of JP2 images. Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Nils of MWR InfoSecurity, and Will Dormann of the CERT/CC, for reporting this issue.

- CVE-ID: CVE-2010-3788
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution
- Description: An uninitialized memory access issue exists in QuickTime's handling of JP2 images. Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of JP2 images. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Damian Put and Procyun, working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3789
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted avi file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue is in QuickTime's handling of avi files. Viewing a maliciously crafted avi file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of avi files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Damian Put working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3790
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of movie files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Honggang Ren of Fortinet's FortiGuard Labs for reporting this issue.

- CVE-ID: CVE-2010-3791
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A buffer overflow exists in QuickTime's handling of MPEG encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3792
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A signedness issue exists in QuickTime's handling of MPEG encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of MPEG encoded movie files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3793
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of Sorenson encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of Sorenson encoded movie files. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative, and Carsten Eiram of Secunia Research for reporting this issue.

- CVE-ID: CVE-2010-3794
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution
- Description: An uninitialized memory access issue exists in QuickTime's handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3795
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted GIF image may lead to an unexpected application termination or arbitrary code execution
- Description: An uninitialized memory access issue exists in QuickTime's handling of GIF images. Viewing a maliciously crafted GIF image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-3800
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted PICT file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of PICT files. Viewing a maliciously crafted PICT file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved validation of PICT files. Credit to Moritz Jodeit of n.runs AG and Damian Put, working with TippingPoint's Zero Day Initiative, and Hossein Lotfi (s0lute), working with VeriSign iDefense Labs for reporting this issue.

- CVE-ID: CVE-2010-3801
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory management. Credit to Damian Put working with TippingPoint's Zero Day Initiative, and Rodrigo Rubira Branco from the Check Point Vulnerability Discovery Team for reporting this issue.

- CVE-ID: CVE-2010-3802
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A memory corruption issue exists in QuickTime's handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved handling of QTVR movie files. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.

- CVE-ID: CVE-2010-1508
- Available for: Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: A heap buffer overflow exists in QuickTime's handling of Track Header (tkhd) atoms. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. This issue does not affect Mac OS X systems. Credit to Moritz Jodeit of n.runs AG, working with TippingPoint's Zero Day Initiative, and Carsten Eiram of Secunia Research for reporting this issue.

- CVE-ID: CVE-2010-0530
- Available for: Windows 7, Vista, XP SP2 or later
- Impact: A local user may have access to sensitive information
- Description: A filesystem permission issue exists in QuickTime. This may allow a local user to access the contents of the "Apple Computer" directory in the user's profile, which may lead to the disclosure of sensitive information. This issue is addressed through improved filesystem permissions. This issue does not affect Mac OS X systems. Credit to Geoff Strickler of On-Line Transaction Consultants for reporting this issue.

- CVE-ID: CVE-2010-4009
- Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Windows 7, Vista, XP SP2 or later
- Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
- Description: An integer overflow exists in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved bounds checking. Credit to Honggang Ren of Fortinet's FortiGuard Labs for reporting this issue.

ファイルのダウンロード Download
  • QuickTime Player for Mac Screenshot 1QuickTime Player for Mac Screenshot 2QuickTime Player for Mac Screenshot 3QuickTime Player for Mac Screenshot 4