Lucene search

K
certCERTVU:449440
HistoryMar 14, 2007 - 12:00 a.m.

Apple ColorSync buffer overflow vulnerability

2007-03-1400:00:00
www.kb.cert.org
23

0.029 Low

EPSS

Percentile

90.7%

Overview

Apple ColorSync contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.

Description

ColorSync is Apple’s color management API. OS X applications and devices can use ColorSync profiles to determine how colors in images should be interpreted.

ColorSync contains a stack based buffer overflow. An attacker may be able to trigger the overflow by convincing a user to open an image with specially crafted embedded ColorSync profile.

From Apple’s Color Management with Mac OS X Panther document:
Based on the Portable Document Format (PDF) 1.4 standard, Quartz is the native Mac OS X 2D drawing engine that generates text, vector, and raster images onscreen. Applications that use Quartz automatically support ColorSync. These applications include Preview, Mail, and Safariπ …Šll of which come with Panther.

Any application, including Safari, Mail and Preview, that can open images and process their ColorSync profiles may be affected by this vulnerability.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code by convincing a user to open a webpage, email message, or image file.


Solution

**Upgrade **
Apple has issued an upgrade to address this issue. See Apple Security Update 2007-003 for more details.


Vendor Information

449440

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Apple Computer, Inc. __ Affected

Updated: March 13, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://docs.info.apple.com/article.html?artnum=305214&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23449440 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Apple for information that was used in this report. Apple thanks Tom Ferris of Security-Protocols for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-0719
Severity Metric: 10.33 Date Public:

0.029 Low

EPSS

Percentile

90.7%