H264 Stream Processing Vulnerability
When processing malformed H264 streams in readSPSandGetDecoderParams, it can lead to OOB read, OOB write and stack_chk crashes. This issue can occur if someone accepts a malicious FaceTime call. To reproduce the issue, the attacker needs to build no-encrypt.c, copy the file to /usr/lib/mylib, use insert_dylib to add /usr/lib/mylib to AVConference, build video-replay.c, use bspatch to apply the attached binpatch to /System/Library/PrivateFrameworks/AVConference.framework/Versions/Current/AVConference, use insert_dylib to add /usr/lib/mylib to AVConference, edit /System/Library/Sandbox/Profiles/com.apple.avconferenced.sb to add /out as allow file read and write, restart the machine, extract the attached sc.zip to /out and change the permissions so it's readable by AVConference, and call the target.