Although browsers are notoriously juicy targets for hackers, Apple's QuickTime is actually three times more likely to pose a threat than Internet Explorer 6 -- and six times more likely to be a threat than Firefox, Danish vulnerability tracker Secunia said this week.
The higher risk posed by QuickTime stems from lackadaisical patching by users. According to an analysis of more than 350,000 system checks done over the last six months by the free Secunia Software Inspector, 33.1 percent of all QuickTime 7 installations weren't up to date with security patches. Another music player, AOL's Winamp, was almost as likely to be outdated: 27 percent of Winamp 5 installations were missing needed security fixes.
Compared to QuickTime or Winamp, Microsoft's Internet Explorer 6 and Mozilla's Firefox are models of security, said Secunia. Only 9.6 percent of IE 6 installations lacked one or more patches, while just 5.2 percent of Firefox 2 deployments needed updating.
The disparity is understandable. Users know browsers often have security holes, and updating them -- particularly Microsoft products -- is often a well-established habit that takes place on a known schedule. But Secunia's data shows that outside of operating systems and browsers, users neglect regular patching.
"This constitutes a significant problem," said Jakob Balle, Secunia's development manager, in a blog post detailing the Software Inspector results. "Most people wouldn't hesitate to open an .mpg, .jpg, .mov or .mp3 file from any source if it seems the least bit interesting and relevant. It's easy to embed a movie in your home page, for example, and all it takes is one unpatched QuickTime vulnerability and a provocative video title to compromise a lot of visitors."
Researchers regularly identify vulnerabilities in QuickTime and Winamp. Secunia's own database, for example, pins 10 bugs on QuickTime 7, three of them so far this year. The most-recently-patched QuickTime flaw was disclosed about three weeks ago and patched on May 1. Winamp 5 sports 11 vulnerabilities, said Secunia; the last bug was also quashed earlier this month.
Balle said that scans of business computers for unpatched applications reveal the same user behavior that inspections of consumer computers expose. "The vulnerable applications tend to be more business-like in nature, exploiting flaws in enterprise software and devices rather than media players," he said. "However, the overall picture is the same: The operating systems, browsers and Microsoft applications in general appear to be updated fairly regularly. But all other applications seem to be forgotten, or receive too low a priority given the severity of the issues."
Part of the problem may be due to the fact that many application vendors don't bake in automated security update mechanisms, leaving it up to users to first recognize the seriousness of a vulnerability and then search for, download and install a patch. Or if vendors do offer automatic patching, updates are done irregularly or not frequently enough. In contrast, QuickTime updater on Windows checks for updates on a default weekly schedule.
Although the free Software Inspector remains available, Secunia is also pushing a server-side edition, dubbed Network Software Inspector.