{"vuid":"VU#873868","idnumber":"873868","name":"Apple Mac OS X ImageIO memory corruption vulnerability","keywords":["Apple","Mac OS X","ImageIO","memory corruption","arbitrary code execution","RAW images","apple_2007-003"],"overview":"Apple's ImageIO framework contains an memory corruption vulnerability that may allow an attacker to execute code on a vulnerable system.","clean_desc":"The RAW Image file format is a popular image format supported by many Apple Mac OS X applications. The ImageIO framework allows applications to read and write various image file formats, including RAW. From Apple Security Update 2007-003: A memory corruption issue exists in the process of handling RAW images. By enticing a user to open a maliciously-crafted image, an attacker can trigger the issue which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of RAW images. This issue does not affect systems prior to Mac OS X v10.4.","impact":"A remote unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition. The specially crafted RAW file used to exploit this vulnerability may be supplied on a web page, as an email attachment or inside an email, or by some other means to convince the user into opening the malicious file.","resolution":"Upgrade Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. See Apple Security Update 2007-003 for more details.","workarounds":"","sysaffected":"","thanks":"Apple credits Luke Church of the Computer Laboratory, University of Cambridge, for reporting this issue.","author":"This document was written by Ryan Giobbi.","public":["http://docs.info.apple.com/article.html?artnum=305214","http://secunia.com/advisories/24479/","http://developer.apple.com/graphicsimaging/workingwithimageio.html","http://en.wikipedia.org/wiki/RAW_image_format"],"cveids":["CVE-2007-0733"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-03-13T21:23:16Z","publicdate":"2007-03-13T00:00:00Z","datefirstpublished":"2007-03-14T20:38:31Z","dateupdated":"2007-03-15T19:30:52Z","revision":19,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"3","cam_impact":"10","cam_easeofexploitation":"16","cam_attackeraccessrequired":"18","cam_scorecurrent":"3.078","cam_scorecurrentwidelyknown":"3.888","cam_scorecurrentwidelyknownexploited":"7.128","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.078,"vulnote":null}