[UNIX] Apple Mac OS X CoreGraphics PDF Type1 Font Integer Overflow Vulnerability
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 5 Aug 2008 11:44:26 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Apple Mac OS X CoreGraphics PDF Type1 Font Integer Overflow Vulnerability
Mac OS X is "a Unix operating system built from the XNU kernel. Mac OS X
provides all the standard Unix capabilities and tools with an additional
GUI component". Remote exploitation of an integer overflow vulnerability
in Apple Inc.'s Mac OS X could allow an attacker to execute arbitrary code
with the privileges of the currently logged in user.
* Mac OS X version 10.5.2
This vulnerability exists due to the way PDF files containing Type 1 fonts
are handled. When processing a font with an overly large length, integer
overflow could occur. This issue leads to heap corruption which can allow
for arbitrary code execution.
Exploitation of this issue allows an attacker to execute arbitrary code.
An attacker could exploit this issue via multiple attack vectors. The most
appealing vector for attack is Safari. An attacker could host a malformed
PDF file on a website and entice a targeted user to open a URL. Upon
opening the URL in Safari the PDF file will be automatically parsed and
exploitation will occur. While this is the most appealing attack vector,
the file can also be attached to an e-mail. Any application which uses the
Apple libraries for file open dialogs will crash upon previewing the
malformed PDF document.
Apple addressed this vulnerability within their Mac OS X 2008-005 security
update. More information is available at the following URL:
07/09/2008 - Initial vendor notification
07/10/2008 - Initial vendor response
07/31/2008 - Public disclosure
The information has been provided by iDefense Labs.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NEWS] Sun xVM VirtualBox Privilege Escalation Vulnerability
- Next by Date: [TOOL] ArpON - ARP Management System
- Previous by thread: [NEWS] Sun xVM VirtualBox Privilege Escalation Vulnerability
- Next by thread: [TOOL] ArpON - ARP Management System