[UNIX] Apple Mac OS X CoreGraphics PDF Type1 Font Integer Overflow Vulnerability



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Apple Mac OS X CoreGraphics PDF Type1 Font Integer Overflow Vulnerability
------------------------------------------------------------------------


SUMMARY

Mac OS X is "a Unix operating system built from the XNU kernel. Mac OS X
provides all the standard Unix capabilities and tools with an additional
GUI component". Remote exploitation of an integer overflow vulnerability
in Apple Inc.'s Mac OS X could allow an attacker to execute arbitrary code
with the privileges of the currently logged in user.

DETAILS

Vulnerable Systems:
* Mac OS X version 10.5.2

This vulnerability exists due to the way PDF files containing Type 1 fonts
are handled. When processing a font with an overly large length, integer
overflow could occur. This issue leads to heap corruption which can allow
for arbitrary code execution.

Analysis:
Exploitation of this issue allows an attacker to execute arbitrary code.
An attacker could exploit this issue via multiple attack vectors. The most
appealing vector for attack is Safari. An attacker could host a malformed
PDF file on a website and entice a targeted user to open a URL. Upon
opening the URL in Safari the PDF file will be automatically parsed and
exploitation will occur. While this is the most appealing attack vector,
the file can also be attached to an e-mail. Any application which uses the
Apple libraries for file open dialogs will crash upon previewing the
malformed PDF document.

Vendor response:
Apple addressed this vulnerability within their Mac OS X 2008-005 security
update. More information is available at the following URL:
<http://support.apple.com/kb/HT2647> http://support.apple.com/kb/HT2647

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2322>
CVE-2008-2322

Disclosure timeline:
07/09/2008 - Initial vendor notification
07/10/2008 - Initial vendor response
07/31/2008 - Public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense Labs.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=730>
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=730



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [UNIX] phpSysInfo Multiple Vulnerabilities (HTTP_ACCEPT_LANGUAGE, sensor_program, VERSION, charset)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple vulnerabilities have been discovered in phpSysInfo allowing ... the attacker to additionally inject the $lng parameter. ... $sensor_program can *still* be used to inject active ...
    (Securiteam)
  • [NT] Directory Traversal In CProxy
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... directory traversal attack and thus gain access to arbitrary files located ... on the CProxy Server system. ... filtering allows a remote attacker to gain attack to arbitrary files on ...
    (Securiteam)
  • [UNIX] KDE URI handler vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A bug in KDE can be used by an attacker to create or truncate arbitrary ... The KDE URI handler does not perform adequate filtering ...
    (Securiteam)
  • [NT] PicoWebServer Unicode Stack Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A buffer overflow vulnerability has been discovered in PicoWebServer, ... exploiting this vulnerability allows a remote attacker to run arbitrary ... an attacker can trigger a stack overflow and cause the ...
    (Securiteam)
  • [NEWS] @Mail Web Interface Multiple Security Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... attacker to point it to mailbox of any registered user in @Mail system. ... Vulnerability 2: SQL database install - Multiple SQL Injection ...
    (Securiteam)