{"vuid":"VU#396820","idnumber":"396820","name":"Apple QuickDraw Manager heap buffer overflow vulnerability","keywords":["Apple","QuickDraw Manager","heap","buffer overflow","arbitrary code execution","PICT image processing","apple_2007-003"],"overview":"Apple QuickDraw contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition.","clean_desc":"PICT is a graphics file format that was used by Apple Macintosh systems prior to Mac OS X as their standard metafile format. OS X systems can open and display PICT files. Apple QuickDraw is a two dimensional graphics library that has been deprecated in Mac OS version 10.4. Apple QuickDraw contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code. By convincing a user to open a specially crafted PICT file with an application that uses the QuickDraw libraries, an attacker can trigger the overflow. Note that since OS 10.4 contains limited support for QuickDraw, this vulnerability does affect recent versions of OS X. Versions of Mac prior to OS X may also be affected.","impact":"A remote unauthenticated attacker may be able to execute arbitrary code or create a denial-of-service condition. The specially crafted PICT file used to exploit this vulnerability may be supplied on a web page, in an email for the victim to select, or by some other means designed to encourage them to process the file with a vulnerable application.","resolution":"Upgrade Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. Users are encouraged to review Apple Support Article ID 305214 and apply the appropriate update for their system.","workarounds":"","sysaffected":"","thanks":"Apple credits to Tom Ferris of Security-Protocols and Mike Price of McAfee AVERT Labs for reporting this issue.","author":"This document was written by Ryan Giobbi.","public":["http://docs.info.apple.com/article.html?artnum=305214","http://secunia.com/advisories/24479/","http://en.wikipedia.org/wiki/PICT","http://en.wikipedia.org/wiki/QuickDraw","http://securitytracker.com/alerts/2007/Mar/1017760.html","http://www.securityfocus.com/bid/22228","http://www.sans.org/newsletters/risk/display.php?v=6&i=5#widely6"],"cveids":["CVE-2007-0588"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-03-13T21:17:46Z","publicdate":"2007-03-13T00:00:00Z","datefirstpublished":"2007-03-14T14:45:11Z","dateupdated":"2007-03-20T16:04:10Z","revision":15,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"10","cam_exploitation":"2","cam_internetinfrastructure":"6","cam_population":"6","cam_impact":"14","cam_easeofexploitation":"12","cam_attackeraccessrequired":"15","cam_scorecurrent":"5.103","cam_scorecurrentwidelyknown":"7.938","cam_scorecurrentwidelyknownexploited":"13.041","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.103,"vulnote":null}