search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple Mac OS X vulnerable to buffer overflow in ColorSync ICC color profile handling

Vulnerability Note VU#980078

Original Release Date: 2005-01-27 | Last Revised: 2005-01-27


Apple's Mac OS X operating system contains a flaw in the handling of ICC color profiles, which may allow arbitrary code execution through a heap-based buffer overflow.


The Apple Mac OS X operating system contains support for ICC color profiles in the ColorSync component. This component contains a flaw in checking boundary conditions which may allow arbitrary code execution. When checking certain parameters in ICC color profiles, improperly formatted or maliciously crafted embedded profiles may cause a heap-based buffer overflow which would allow arbitrary code execution.


An attacker with the ability to supply a maliciously crafted profile may be able to execute arbitrary code on a vulnerable system.  The attacker-supplied code would be executed with the privileges of the user running ColorSync.


Apply a patch

Apple advises all users to apply Apple Security Update 2005-001, as it fixes this flaw and other critical security flaws. More information can be found at:


Vendor Information

Expand all

Apple Computer Inc.

Updated:  January 27, 2005



Vendor Statement

Please see the following link for the statement from Apple Computer Inc.:


Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



Thanks to Apple Product Security for reporting this vulnerability.

This document was written by Ken MacInnis.

Other Information

CVE IDs: CVE-2005-0126
Severity Metric: 4.13
Date Public: 2005-01-25
Date First Published: 2005-01-27
Date Last Updated: 2005-01-27 22:54 UTC
Document Revision: 7

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.