ID

VAR-200602-0303


CVE

CVE-2006-0382


TITLE

Apple Mac OS X Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2006-003723

DESCRIPTION

Apple Mac OS X 10.4.5 and allows local users to cause a denial of service (crash) via an undocumented system call. This issue is do to the kernel's failure to properly handle the execution of an undocumented system call. The vulnerability is caused due to an unspecified error in an undocumented system call. and can be exploited to crash the system. SOLUTION: Update to version 10.4.5. ORIGINAL ADVISORY: http://docs.info.apple.com/article.html?artnum=303290 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-0382 // JVNDB: JVNDB-2006-003723 // BID: 16654 // VULHUB: VHN-16490 // PACKETSTORM: 43911

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 2.4

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

sources: BID: 16654 // JVNDB: JVNDB-2006-003723 // CNNVD: CNNVD-200602-180 // NVD: CVE-2006-0382

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-0382
value: LOW

Trust: 1.0

NVD: CVE-2006-0382
value: LOW

Trust: 0.8

CNNVD: CNNVD-200602-180
value: LOW

Trust: 0.6

VULHUB: VHN-16490
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2006-0382
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-16490
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-16490 // JVNDB: JVNDB-2006-003723 // CNNVD: CNNVD-200602-180 // NVD: CVE-2006-0382

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-0382

THREAT TYPE

local

Trust: 1.0

sources: BID: 16654 // PACKETSTORM: 43911 // CNNVD: CNNVD-200602-180

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200602-180

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-003723

EXTERNAL IDS

db:NVDid:CVE-2006-0382

Trust: 2.8

db:BIDid:16654

Trust: 2.0

db:SECUNIAid:18907

Trust: 1.8

db:SECTRACKid:1015634

Trust: 1.7

db:VUPENid:ADV-2006-0597

Trust: 1.7

db:OSVDBid:23190

Trust: 1.7

db:JVNDBid:JVNDB-2006-003723

Trust: 0.8

db:CNNVDid:CNNVD-200602-180

Trust: 0.7

db:APPLEid:APPLE-SA-2006-02-14

Trust: 0.6

db:XFid:24682

Trust: 0.6

db:VULHUBid:VHN-16490

Trust: 0.1

db:PACKETSTORMid:43911

Trust: 0.1

sources: VULHUB: VHN-16490 // BID: 16654 // JVNDB: JVNDB-2006-003723 // PACKETSTORM: 43911 // CNNVD: CNNVD-200602-180 // NVD: CVE-2006-0382

REFERENCES

url:http://lists.apple.com/archives/security-announce/2006/feb/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/16654

Trust: 1.7

url:http://www.osvdb.org/23190

Trust: 1.7

url:http://securitytracker.com/id?1015634

Trust: 1.7

url:http://secunia.com/advisories/18907

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/0597

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/24682

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0382

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-0382

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/24682

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/0597

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.apple.com/support/downloads/macosxupdate1045forintel.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxupdate1045.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1045.html

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=303290

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxupdate1045combo.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/18907/

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-16490 // BID: 16654 // JVNDB: JVNDB-2006-003723 // PACKETSTORM: 43911 // CNNVD: CNNVD-200602-180 // NVD: CVE-2006-0382

CREDITS

Discovery of this issue is credited to David Goldsmith of Matasano.

Trust: 0.9

sources: BID: 16654 // CNNVD: CNNVD-200602-180

SOURCES

db:VULHUBid:VHN-16490
db:BIDid:16654
db:JVNDBid:JVNDB-2006-003723
db:PACKETSTORMid:43911
db:CNNVDid:CNNVD-200602-180
db:NVDid:CVE-2006-0382

LAST UPDATE DATE

2024-11-23T22:28:35.805000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-16490date:2017-07-20T00:00:00
db:BIDid:16654date:2006-02-15T17:17:00
db:JVNDBid:JVNDB-2006-003723date:2013-12-26T00:00:00
db:CNNVDid:CNNVD-200602-180date:2006-02-28T00:00:00
db:NVDid:CVE-2006-0382date:2024-11-21T00:06:20.180

SOURCES RELEASE DATE

db:VULHUBid:VHN-16490date:2006-02-14T00:00:00
db:BIDid:16654date:2006-02-14T00:00:00
db:JVNDBid:JVNDB-2006-003723date:2013-12-26T00:00:00
db:PACKETSTORMid:43911date:2006-02-16T21:45:30
db:CNNVDid:CNNVD-200602-180date:2006-02-14T00:00:00
db:NVDid:CVE-2006-0382date:2006-02-14T22:06:00