Mac users have reported issues with a critical security update that Apple published for the QuickTime media player that upgraded the application to version 7.0.4.
One user, 'donald mc', complained on an Apple user forum: "This 7.0.4 update, as well as the 7.0.3 updater, causes all the QuickTime movies on my website to break.
"Many of the movies on my website have been there for years and years. I'm not opposed to re-working the movies if need be for new software versions, but these last couple of updates have done nothing but cause problems in Safari 1.3.1."
Shortly after publishing the security patch, Apple made available a " reinstaller" for Mac systems that removes QuickTime 7.0.4 and replaces it with the older 7.0.1 version.
The company did not provide any additional information about the problems, nor why it chose to downgrade to version 7.0.1 instead of the most recent 7.0.3. The company had not, at time of going to press, returned several phone calls by vnunet.com seeking further information.
It is not clear whether the problems with the upgraded version are limited to Mac systems or whether Windows users are also affected.
QuickTime 7.0.4 is still available for download from Apple's website for both OS X and Windows systems, but some users have reported that it will no longer install through the OS X auto update feature.
At the time of publication, we were unable to install the application through the Update feature designed for the Windows version.
The update aimed to repair several critical security flaws in the player that affected both Apple and Windows systems. The vulnerability could allow an attacker to take control of a machine, Apple warned in an security advisory on its website.
The media player improperly handles QTIF, TGA, TIFF and GIF images, as well as the .qts movie format.
The .qts and GIF flaws were discovered by security firm eEye Digital Security. The firm gave both vulnerabilities a severity ranking of 'critical'.
Apple credited Fortinet with discovering the TGA and TIFF vulnerabilities. The QTIF flaw was discovered by an individual called Varun Uppal.
Why does Facebook store "my entire call history with my partner's mum", asks developer who requested his Facebook data
Facebook database included text-message metadata - despite not using Facebook Messenger for SMS
Before Ocado could start selling the technology it had developed to other retailers, it had to tear down and rebuild its own monolithic architecture
Successful attack could result in harm to patients and financial loss, warns NHS governing body
Guccifer 2.0 claimed to be a lone Romanian hacker - until a schoolboy error gave him, her or them away