← Back to CVEs
CVE-2009-0010
N/ADescription
Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, and Apple QuickTime before 7.6.2, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PICT image with a crafted 0x77 Poly tag and a crafted length field, which triggers a heap-based buffer overflow.
CVE Details
CVSS v3.1 ScoreN/A
Published5/13/2009
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
apple:mac_os_xapple:mac_os_x_server
Weaknesses (CWE)
CWE-189
References
http://secunia.com/advisories/35074(cve@mitre.org)
http://secunia.com/advisories/35091(cve@mitre.org)
http://support.apple.com/kb/HT3549(cve@mitre.org)
http://support.apple.com/kb/HT3591(cve@mitre.org)
http://www.securityfocus.com/archive/1/503878/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/34926(cve@mitre.org)
http://www.securityfocus.com/bid/34938(cve@mitre.org)
http://www.securitytracker.com/id?1022209(cve@mitre.org)
http://www.us-cert.gov/cas/techalerts/TA09-133A.html(cve@mitre.org)
http://www.vupen.com/english/advisories/2009/1297(cve@mitre.org)
http://www.vupen.com/english/advisories/2009/1407(cve@mitre.org)
http://www.vupen.com/exploits/Apple_QuickTime_PICT_Poly_Tag_Parsing_Heap_Overflow_PoC_Exploit_1407144.php(cve@mitre.org)
http://www.zerodayinitiative.com/advisories/ZDI-09-021(cve@mitre.org)
http://www.zerodayinitiative.com/advisories/ZDI-09-021/(cve@mitre.org)
http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35074(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35091(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT3549(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT3591(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/503878/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/34926(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/34938(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1022209(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA09-133A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/1297(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/1407(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/exploits/Apple_QuickTime_PICT_Poly_Tag_Parsing_Heap_Overflow_PoC_Exploit_1407144.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-09-021(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-09-021/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.