Advisory Details

April 5th, 2010

Apple Mac OS X ImageIO Framework JPEG2000 Remote Code Execution Vulnerability

ZDI-10-058
ZDI-CAN-634

CVE ID CVE-2010-0505
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Apple
AFFECTED PRODUCTS OS X
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['9599']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the Apple ImageIO framework during the parsing of malformed JPEG2000 files. The function CGImageReadGetBytesAtOffset can utilize miscalculated values during a memmove operation that will result in an exploitable heap corruption allowing attackers to execute arbitrary code under the context of the current user.

ADDITIONAL DETAILS Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT4077
DISCLOSURE TIMELINE
  • 2010-02-02 - Vulnerability reported to vendor
  • 2010-04-05 - Coordinated public release of advisory
CREDIT 85319bb6e6ab398b334509c50afce5259d42756e
BACK TO ADVISORIES