Apple Mac OS X Finder DMG Volume Memory Corruption Vulnerability

The following proof-of-concept DMG image demonstrates this issue.

The proof-of-concept code can be used to create a malicious DMG image with a random 255-byte payload that will trigger the condition.


 

Privacy Statement
Copyright 2010, SecurityFocus