{"vuid":"VU#529945","idnumber":"529945","name":"Apple Mac OS X QuickDraw Manager fails to properly handle corrupt PICT files","keywords":["Apple","Macintosh","OS X","Quickdraw Manager","buffer overflow","arbitrary code execution","PICT file"],"overview":"Apple Mac OS X QuickDraw Manager contains a buffer overflow that may allow a remote attacker to execute arbitrary code.","clean_desc":"Apple Mac OS X QuickDraw is a 2D graphics library. It is used by several applications, including Safari, Mail, and Finder. QuickDraw is used to render PICT images on Mac systems. QuickDraw Manager contains an unspecified buffer overflow in the handling of PICT images.","impact":"By convincing a user to view a specially crafted PICT image (e.g., contained within a web page or an HTML email message), an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause the application using the QuickDraw library to crash.","resolution":"Apply an update\nPlease see Apple Security Update 2005-008 for details on workarounds, fixes, and updates.","workarounds":"","sysaffected":"","thanks":"Thanks to Apple Product Security for reporting this vulnerability, who in turn credit Henrik Dalgaard of Echo One.","author":"This document was written by Will Dormann.","public":["http://docs.info.apple.com/article.html?artnum=302413","http://developer.apple.com/documentation/Carbon/Reference/QuickDraw_Ref/index.html","http://developer.apple.com/documentation/mac/QuickDraw/QuickDraw-333.html#HEADING333-29","http://www.auscert.org.au/5509","http://securitytracker.com/alerts/2005/Sep/1014961.html","http://www.securityfocus.com/bid/14914","http://secunia.com/advisories/16920/","http://xforce.iss.net/xforce/xfdb/22384","http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33420"],"cveids":["CVE-2005-2744"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-09-23T14:41:02Z","publicdate":"2005-09-21T00:00:00Z","datefirstpublished":"2005-09-27T15:29:16Z","dateupdated":"2005-09-27T15:29:25Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"28.6875","cam_scorecurrentwidelyknown":"45.5625","cam_scorecurrentwidelyknownexploited":"79.3125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":28.6875,"vulnote":null}