Reverse Mode – [0day] Apple QuickTime

Today we’re going to talk about an interesting “backdoor” I uncovered during a static reversing session against QTPlugin.ocx. WATCH OUT! Do not hype this issue beyond it deserves. This time Backdoor != malicious code but a horrible trick a developer implemented during the development cycle.These hacks could end up having a harmful impact.
Reverse Mode – [0day] Apple QuickTime “_Marshaled_pUnk” backdoor param client-side arbitrary code execution

A me questa cosa provoca un fastidio tremendo: una backdoor in quicktime?!