Please note: QuickTime 7 is for use with Windows Vista or Windows 7. If installed on other versions of Windows, it may not offer full functionality and is unsupported.
What's New in QuickTime 7.7.9
• QuickTime 7.7.9 improves security and is recommended for all QuickTime 7 users on Windows. For information on the security content of this update, please visit this website: http://support.apple.com/kb/HT201222.
• The QuickTime web browser plug-in is no longer installed by default and is removed if you have a previous version of QuickTime on your PC. If you still need this legacy plug-in, you can add it back using the custom setup option in the installer.
Important notice to QuickTime 6 Pro users
Installing QuickTime 7 or later will disable the QuickTime Pro functionality in prior versions of QuickTime, such as QuickTime 6. If you are a QuickTime 6 Pro user, see this article: http://support.apple.com/kb/HT201691#compatibility before proceeding with this installation.
Stay up-to-date
Updates to QuickTime and other Apple software may be applied using Apple Software Update for Windows. Apple Software Update for Windows is installed with QuickTime 7.7.9.
For more information
For more information about using QuickTime 7, open QuickTime Player and choose Help > QuickTime Player Help.
Security Notes
Available for: Windows 7 and Windows Vista
Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-7085 : an anonymous researcher
CVE-2015-7086 : an anonymous researcher
CVE-2015-7087 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7088 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7089 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7090 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-7091 : Pedro Ribeiro (pedrib@gmail.com) of Agile Information Security
CVE-2015-7092 : Jaanus Kp Clarified Security working with HP's Zero Day Initiative
CVE-2015-7117: Ryan Pentney and Richard Johnson of Cisco Talos