|
|
| |
Credit:
The information has been provided by Charlie Miller.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-09-023
|
| |
Vulnerable Systems:
* Apple Mac OS X version 10.4.11
* Apple Mac OS X Server version 10.4.11
The specific flaw appears to exist in the ATSServer font server upon parsing of malicious Compact Font Format files. A boundary condition exists in the parsing of internal dictionaries that can lead to a memory corruption allowing the execution of arbitrary code.
A heap buffer overflow exists in Apple Type Services' handling of Compact Font Format (CFF) fonts. Viewing or downloading a document containing a maliciously crafted embedded CFF font may lead to arbitrary code execution. This update addresses the issue through improved bounds checking. Credit to Charlie Miller of Independent Security Evaluators working with TippingPoint's Zero Day Initiative for reporting this issue.
Patch Availability:
Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT3549
CVE Information:
CVE-2009-0154
|
|
|