{"vuid":"VU#145486","idnumber":"145486","name":"Apple Cocoa applications vulnerable to denial of service via malformed TIFF image","keywords":["Apple","AppKit","DoS","denial of service","TIFF","Cocoa","NXSeek()"],"overview":"Apple Mac OS X applications using the Cocoa environment may quit due to an unhandled exception in TIFF image handling routines.","clean_desc":"Mac OS X applications may take advantage of the Cocoa programming environment, which is described by Apple as \"an object-oriented application environment designed specifically for developing Mac OS X-only native applications.\"  The NXSeek() routine may seek to an offset outside of the image when handling malformed TIFF files. This raises an exception that is not handled and as such may cause the application to quit resulting in a denial-of-service condition.","impact":"An unauthenticated attacker may craft a malformed TIFF file that may cause an application to quit unexpectedly if the TIFF file is opened within the application. This may be triggered remotely if the application is handling remotely submitted data such as electronic mail.","resolution":"Apply An Update Apple has addressed the issue in Security Update 2005-005.","workarounds":"","sysaffected":"","thanks":"Thanks to Apple Product Security for reporting this vulnerability, who in turn credit \nHenrik Dalgaard of Echo One \nwith reporting the vulnerability","author":"This document was written by Ken MacInnis.","public":["http://docs.info.apple.com/article.html?artnum=301528","http://secunia.com/advisories/15227/"],"cveids":["CVE-2005-1330"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-04T15:17:51Z","publicdate":"2005-05-03T00:00:00Z","datefirstpublished":"2005-05-09T16:42:02Z","dateupdated":"2005-05-11T14:29:24Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"1.603125","cam_scorecurrentwidelyknown":"2.025","cam_scorecurrentwidelyknownexploited":"3.7125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.603125,"vulnote":null}