This indicates an attack attempt against a code-execution vulnerability in
The vulnerability is caused by an error when the vulnerable software handles
a malicious PICT file. It allows a remote attacker to execute arbitrary code via sending a crafted file.
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the latest update from the vendor.