Vulnerability Note VU#559444

Apple Mac OS X ImageIO integer overflow vulnerability

Original Release date: 14 Mar 2007 | Last revised: 01 Oct 2007


Apple's ImageIO framework contains an integer overflow vulnerability that may allow an attacker to execute code on a vulnerable system.


Graphics Interchange Format (GIF) is a popular image format supported by many Apple Mac OS X applications. The ImageIO framework allows applications to read and write various image file formats, including GIF.

From Apple Security Update 2007-003:

    An integer overflow vulnerability exists in the process of handling GIF files. By enticing a user to open a maliciously-crafted image, an attacker can trigger the overflow which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of GIF files. This issue does not affect systems prior to Mac OS X v10.4.


A remote unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition. The specially crafted GIF file used to exploit this vulnerability may be supplied on a web page, as an email attachment or inside an email, or by some other means to convince the user into opening the malicious file.



Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. See Apple Security Update 2007-003 for more details.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-14 Mar 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Apple credits Tom Ferris of Security-Protocols for reporting this issue.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2007-1071
  • Date Public: 13 Mar 2007
  • Date First Published: 14 Mar 2007
  • Date Last Updated: 01 Oct 2007
  • Severity Metric: 2.07
  • Document Revision: 23


If you have feedback, comments, or additional information about this vulnerability, please send us email.