Apple ColorSync contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.
ColorSync is Appleβs color management API. OS X applications and devices can use ColorSync profiles to determine how colors in images should be interpreted.
ColorSync contains a stack based buffer overflow. An attacker may be able to trigger the overflow by convincing a user to open an image with specially crafted embedded ColorSync profile.
From Appleβs Color Management with Mac OS X Panther document:
Based on the Portable Document Format (PDF) 1.4 standard, Quartz is the native Mac OS X 2D drawing engine that generates text, vector, and raster images onscreen. Applications that use Quartz automatically support ColorSync. These applications include Preview, Mail, and Safariπ
ll of which come with Panther.
Any application, including Safari, Mail and Preview, that can open images and process their ColorSync profiles may be affected by this vulnerability.
A remote, unauthenticated attacker may be able to execute arbitrary code by convincing a user to open a webpage, email message, or image file.
**Upgrade **
Apple has issued an upgrade to address this issue. See Apple Security Update 2007-003 for more details.
449440
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: March 13, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://docs.info.apple.com/article.html?artnum=305214> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23449440 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Apple for information that was used in this report. Apple thanks Tom Ferris of Security-Protocols for reporting this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2007-0719 |
---|---|
Severity Metric: | 10.33 Date Public: |