{"vuid":"VU#546772","idnumber":"546772","name":"Apple Mac OS X JPEG2000 image handling buffer overflow","keywords":["Apple","Mac OS X","buffer overflow","code execution","apple-2006-006"],"overview":"Apple Mac OS X fails to properly handle JPEG2000 files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"Apple ImageIO is an image processing framework that was introduced in OS X 10.4 (Tiger). ImageIO is used by several applications, including WebCore and Safari. ImageIO contains an unspecified buffer overflow in the handling of JPEG2000 images.","impact":"By convincing a user to view a specially crafted JPEG2000 image, an attacker could execute arbitrary code with the privileges of the user. The attacker could also cause the application using the ImageIO library to crash. Any application that uses ImageIO may be vulnerable.","resolution":"Apply an update \nPlease see Apple Security Update 2006-006 for details on workarounds, fixes, and updates.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Apple Security Update \n2006-006\n. Apple credits \nTom Saxton of Idle Loop Software Design for reporting this issue.","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/22187/","http://docs.info.apple.com/article.html?artnum=304460"],"cveids":["CVE-2006-4391"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-10-02T13:17:22Z","publicdate":"2006-09-29T00:00:00Z","datefirstpublished":"2006-10-02T16:24:42Z","dateupdated":"2006-11-21T18:12:58Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"16","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.7","cam_scorecurrentwidelyknown":"22.5","cam_scorecurrentwidelyknownexploited":"40.5","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.7,"vulnote":null}