Lucene search

K
zdiMichael DePlante (@izobashi) of Trend Micro's Zero Day InitiativeZDI-24-207
HistoryFeb 26, 2024 - 12:00 a.m.

Apple macOS VideoToolbox Out-Of-Bounds Write Remote Code Execution Vulnerability

2024-02-2600:00:00
Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative
www.zerodayinitiative.com
8
apple
macos
videotoolbox
out-of-bounds write
remote code execution
vulnerability
user interaction
heic files
arbitrary code

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.8%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must receive a malicious image file that is written to the local filesystem. The specific flaw exists within the processing of HEIC files in the VTDecoderXPCService process. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.8%