|
|
|
|
| |
Credit:
The information has been provided by Andrzej Dyjak .
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897
|
| |
Vulnerable Systems:
* Apple iTunes versions prior to 10.2
Immune Systems:
* Apple iTunes version 10.2
The Apple Inc.'s CoreGraphics library could allow an attacker to execute arbitrary code with the privileges of the current user.
This vulnerability occurs during the processing of an embedded International Color Consortium (ICC) profile within a JPEG image. A small block of heap memory may be allocated for processing certain profile data. An index value is used to reference locations within this heap block. The index value can be manipulated in a manner that results in multiple memory writes to locations outside the bounds of the heap allocated block. This condition may lead to arbitrary code execution.
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the user viewing the JPEG image. To exploit this vulnerability, a targeted user must load a malicious JPEG image. An attacker typically accomplishes this via social engineering or injecting content into compromised, trusted sites. After the user visits the malicious Web page, no further user interaction is needed.
Patch Availability:
Apple Inc. has released patches which addresses this issue. For more information, consult their advisory at the following URL:
http://support.apple.com/kb/HT4554
CVE Information:
CVE-2011-0170
Disclosure Timeline:
08/11/2010 Initial Vendor Notification
08/11/2010 Initial Vendor Reply
03/02/2011 Coordinated Public Disclosure
|
|
|
|
|