search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple Cocoa applications vulnerable to denial of service via malformed TIFF image

Vulnerability Note VU#145486

Original Release Date: 2005-05-09 | Last Revised: 2005-05-11


Apple Mac OS X applications using the Cocoa environment may quit due to an unhandled exception in TIFF image handling routines.


Mac OS X applications may take advantage of the Cocoa programming environment, which is described by Apple as "an object-oriented application environment designed specifically for developing Mac OS X-only native applications." The NXSeek() routine may seek to an offset outside of the image when handling malformed TIFF files. This raises an exception that is not handled and as such may cause the application to quit resulting in a denial-of-service condition.


An unauthenticated attacker may craft a malformed TIFF file that may cause an application to quit unexpectedly if the TIFF file is opened within the application. This may be triggered remotely if the application is handling remotely submitted data such as electronic mail.


Apply An Update

Apple has addressed the issue in Security Update 2005-005.

Vendor Information

Affected   Unknown   Unaffected

Apple Computer Inc.

Updated:  May 05, 2005



Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Apple has addressed the issue in Security Update 2005-005.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



Thanks to Apple Product Security for reporting this vulnerability, who in turn credit Henrik Dalgaard of Echo One with reporting the vulnerability

This document was written by Ken MacInnis.

Other Information

CVE IDs: CVE-2005-1330
Severity Metric: 1.60
Date Public: 2005-05-03
Date First Published: 2005-05-09
Date Last Updated: 2005-05-11 14:29 UTC
Document Revision: 6

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.