606
VMScore

CVE-2022-22584

Published: 18/03/2022 Updated: 28/03/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows remote malicious users to disclose sensitive information on affected installations of Apple macOS ColorSync. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICC images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple ipados

apple iphone os

apple macos

apple tvos

apple watchos

Vendor Advisories

About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security updates page Apple security documents reference vulnerabilities by CVE-ID&nbsp ...

Mailing Lists

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-01-26-1 iOS 153 and iPadOS 153 iOS 153 and iPadOS 153 addresses the following issues Information about the security content is also available at supportapplecom/HT213053 ColorSync Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5 ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-01-26-6 watchOS 84 watchOS 84 addresses the following issues Information about the security content is also available at supportapplecom/HT213059 ColorSync Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted file may lead to arbitrary ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-01-26-2 macOS Monterey 122 macOS Monterey 122 addresses the following issues Information about the security content is also available at supportapplecom/HT213054 AMD Kernel Available for: macOS Monterey Impact: A malicious application may be able to execute arbitrary c ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-01-26-5 tvOS 153 tvOS 153 addresses the following issues Information about the security content is also available at supportapplecom/HT213057 ColorSync Available for: Apple TV 4K and Apple TV HD Impact: Processing a maliciously crafted file may lead to arbitrary code ex ...