Apple has announced the release of security updates to address the vulnerability discovered last month. The vulnerability allows attackers to disrupt the proper functioning of an application by introducing data in an unplanned way, executing commands on the system where the application is running, or accessing memory to execute code at the program privileges level.
The vulnerability is caused by an overflow of buffers when data is recorded without checking its boundaries. The overflow results in the execution of arbitrary code. In addition, the vulnerability occurs due to a lack of verification of user-entered data, allowing for a direct SQL attack.
All major operating systems, including Microsoft Windows, Mac OS, Unix, and Openvms, are affected by this vulnerability. Therefore, Apple’s security update should be applied as soon as possible to minimize the risk of attacks.