This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ImageIO framework. Crafted data in a PICT image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple mac os x 10.15 |
||
apple mac os x 10.15.7 |
||
apple mac os x 10.15.6 |
||
apple iphone os |
||
apple tvos |
||
apple mac os x 10.15.1 |
||
apple mac os x 10.15.2 |
||
apple mac os x 10.15.3 |
||
apple mac os x 10.15.4 |
||
apple mac os x 10.15.5 |
||
apple watchos |
||
apple ipados |
||
apple macos |