{"vuid":"VU#980078","idnumber":"980078","name":"Apple Mac OS X vulnerable to buffer overflow in ColorSync ICC color profile handling","keywords":["Apple","Mac OS X","buffer overflow","ICC color profile","ColorSync"],"overview":"Apple's Mac OS X operating system contains a flaw in the handling of ICC color profiles, which may allow arbitrary code execution through a heap-based buffer overflow.","clean_desc":"The Apple Mac OS X operating system contains support for ICC color profiles in the ColorSync component. This component contains a flaw in checking boundary conditions which may allow arbitrary code execution. When checking certain parameters in ICC color profiles, improperly formatted or maliciously crafted embedded profiles may cause a heap-based buffer overflow which would allow arbitrary code execution.","impact":"An attacker with the ability to supply a maliciously crafted profile may be able to execute arbitrary code on a vulnerable system.  The attacker-supplied code would be executed with the privileges of the user running ColorSync.","resolution":"Apply a patch Apple advises all users to apply Apple Security Update 2005-001, as it fixes this flaw and other critical security flaws. More information can be found at: <http://docs.info.apple.com/article.html?artnum=300770>","workarounds":"","sysaffected":"","thanks":"Thanks to Apple Product Security for reporting this vulnerability.","author":"This document was written by Ken MacInnis.","public":["http://docs.info.apple.com/article.html?artnum=300770","http://secunia.com/advisories/14005/"],"cveids":["CVE-2005-0126"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-01-27T19:39:10Z","publicdate":"2005-01-25T00:00:00Z","datefirstpublished":"2005-01-27T22:52:56Z","dateupdated":"2005-01-27T22:54:34Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"8","cam_attackeraccessrequired":"6","cam_scorecurrent":"4.131","cam_scorecurrentwidelyknown":"5.2785","cam_scorecurrentwidelyknownexploited":"9.8685","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.131,"vulnote":null}