SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Mac OS X Vendors:   Apple Computer
Mac OS X Image Raw Buffer Overflow in Processing DNG Image Files Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1023473
SecurityTracker URL:  http://securitytracker.com/id/1023473
CVE Reference:   CVE-2010-0037   (Links to External Site)
Date:  Jan 19 2010
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.5.8, 10.6.2
Description:   A vulnerability was reported in Mac OS X Image RAW. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted DNG image file that, when loaded by the target user, will trigger a buffer overflow in Image RAW and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Jason Carr of Carnegie Mellon University Computing Services reported this vulnerability.

Impact:   A remote user can create a DNG image file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix as part of Security Update 2010-001, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

For Mac OS X v10.5.8
The download file is named: SecUpd2010-001.dmg
Its SHA-1 digest is: f3f5061ca161355c8a5f1d1a52d5e8a9e604a30d

For Mac OS X Server v10.5.8
The download file is named: SecUpdSrvr2010-001.dmg
Its SHA-1 digest is: 32c5ecdb0aeabe0f4eaa061a271242b6d96d8ba1

For Mac OS X v10.6.2 and Mac OS X Server v10.6.2
The download file is named: SecUpd2010-001Snow.dmg
Its SHA-1 digest is: 8c1f0a08edf557d9242974e925ff58deb5e5dbf2

The vendor's advisory will be available at:

http://support.apple.com/kb/HT1222

Vendor URL:  www.apple.com/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Tue, 19 Jan 2010 22:30:27 +0000
Subject:  Mac OS X


Image RAW
CVE-ID:  CVE-2010-0037
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6.2, Mac OS X Server v10.6.2
Impact:  Viewing a maliciously crafted DNG image may lead to an
unexpected application termination or arbitrary code execution
Description:  A buffer overflow exists in Image RAW's handling of DNG
images. Viewing a maliciously crafted DNG image may lead to an
unexpected application termination or arbitrary code execution. This
issue is addressed through improved bounds checking. Credit to Jason
Carr of Carnegie Mellon University Computing Services for reporting
this issue.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC