First published: Thu May 26 2005(Updated: )
Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Keynote | =2.0.1 | |
Apple Keynote | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1408 is considered a medium severity vulnerability due to its potential to allow unauthorized access to sensitive files.
CVE-2005-1408 allows attackers to read arbitrary files on a user's system through crafted Keynote presentations.
To mitigate CVE-2005-1408, users should update to the latest version of Apple Keynote that resolves this vulnerability.
CVE-2005-1408 affects Apple Keynote versions 2.0.0 and 2.0.1.
Yes, CVE-2005-1408 can be exploited remotely by sending specially crafted Keynote presentations to the target.