ID

VAR-200701-0396


CVE

CVE-2007-0463


TITLE

Apple Software Update Format String Vulnerability

Trust: 1.1

sources: BID: 22222 // JVNDB: JVNDB-2007-001440

DESCRIPTION

Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via format string specifiers in (1) SWUTMP or (2) SUCATALOG filenames, or using the (3) application/x-apple.sucatalog+xml MIME type. (1) SWUTMP File name format string specifier (2) SUCATALOG File name format string specifier (3) application/x-apple.sucatalog+xml MIME Using types. Apple Software Update is prone to a format-string vulnerability. This issue presents itself because the application fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. A successful attack may crash the application or possibly lead to arbitrary code execution. This may facilitate unauthorized access or privilege escalation in the context of the user running the application. Apple Software Update is used to distribute patches to end users via the HTTP protocol. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Mac OS X Mach-O Universal Binary Memory Corruption SECUNIA ADVISORY ID: SA23088 VERIFY ADVISORY: http://secunia.com/advisories/23088/ CRITICAL: Less critical IMPACT: DoS, System access WHERE: Local system OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: LMH has reported a vulnerability in Mac OS X, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. The vulnerability is caused due to an error in the fatfile_getarch2() function. This can be exploited to cause an integer overflow and may potentially allow execution of arbitrary code with kernel privileges via a specially crafted Mach-O Universal binary. The vulnerability is reported in a fully patched Mac OS X (2006-11-26). Other versions may also be affected. SOLUTION: Grant only trusted users access to affected systems. PROVIDED AND/OR DISCOVERED BY: LMH ORIGINAL ADVISORY: http://projects.info-pull.com/mokb/MOKB-26-11-2006.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-0463 // JVNDB: JVNDB-2007-001440 // BID: 22222 // VULHUB: VHN-23825 // PACKETSTORM: 52529

AFFECTED PRODUCTS

vendor:applemodel:software updatescope:eqversion:2.0.5

Trust: 2.7

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.4.9

Trust: 0.3

sources: BID: 22222 // JVNDB: JVNDB-2007-001440 // CNNVD: CNNVD-200701-493 // NVD: CVE-2007-0463

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0463
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-0463
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200701-493
value: MEDIUM

Trust: 0.6

VULHUB: VHN-23825
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-0463
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23825
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23825 // JVNDB: JVNDB-2007-001440 // CNNVD: CNNVD-200701-493 // NVD: CVE-2007-0463

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0463

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200701-493

TYPE

format string

Trust: 0.6

sources: CNNVD: CNNVD-200701-493

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001440

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-23825

PATCH

title:APPLE-SA-2007-03-13url:http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-001440

EXTERNAL IDS

db:NVDid:CVE-2007-0463

Trust: 2.8

db:USCERTid:TA07-072A

Trust: 2.5

db:BIDid:22222

Trust: 2.0

db:VUPENid:ADV-2007-0930

Trust: 1.7

db:VUPENid:ADV-2007-0337

Trust: 1.7

db:OSVDBid:32703

Trust: 1.7

db:SECTRACKid:1017755

Trust: 1.7

db:SECUNIAid:24479

Trust: 1.7

db:JVNDBid:JVNDB-2007-001440

Trust: 0.8

db:CNNVDid:CNNVD-200701-493

Trust: 0.7

db:APPLEid:APPLE-SA-2007-03-13

Trust: 0.6

db:CERT/CCid:TA07-072A

Trust: 0.6

db:EXPLOIT-DBid:29523

Trust: 0.1

db:SEEBUGid:SSVID-83020

Trust: 0.1

db:VULHUBid:VHN-23825

Trust: 0.1

db:SECUNIAid:23088

Trust: 0.1

db:PACKETSTORMid:52529

Trust: 0.1

sources: VULHUB: VHN-23825 // BID: 22222 // JVNDB: JVNDB-2007-001440 // PACKETSTORM: 52529 // CNNVD: CNNVD-200701-493 // NVD: CVE-2007-0463

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta07-072a.html

Trust: 2.5

url:http://projects.info-pull.com/moab/moab-24-01-2007.html

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2007/mar/msg00002.html

Trust: 1.7

url:http://www.securityfocus.com/bid/22222

Trust: 1.7

url:http://docs.info.apple.com/article.html?artnum=305214

Trust: 1.7

url:http://www.osvdb.org/32703

Trust: 1.7

url:http://www.securitytracker.com/id?1017755

Trust: 1.7

url:http://secunia.com/advisories/24479

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/0337

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/0930

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0463

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0463

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/0337

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/0930

Trust: 0.6

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://projects.info-pull.com/mokb/mokb-26-11-2006.html

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/advisories/23088/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-23825 // BID: 22222 // JVNDB: JVNDB-2007-001440 // PACKETSTORM: 52529 // CNNVD: CNNVD-200701-493 // NVD: CVE-2007-0463

CREDITS

Kevin Finisterre dotslash@snosoft.com

Trust: 0.6

sources: CNNVD: CNNVD-200701-493

SOURCES

db:VULHUBid:VHN-23825
db:BIDid:22222
db:JVNDBid:JVNDB-2007-001440
db:PACKETSTORMid:52529
db:CNNVDid:CNNVD-200701-493
db:NVDid:CVE-2007-0463

LAST UPDATE DATE

2024-09-19T21:58:37.026000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23825date:2011-03-08T00:00:00
db:BIDid:22222date:2007-03-13T22:45:00
db:JVNDBid:JVNDB-2007-001440date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200701-493date:2007-01-30T00:00:00
db:NVDid:CVE-2007-0463date:2011-03-08T02:49:51.923

SOURCES RELEASE DATE

db:VULHUBid:VHN-23825date:2007-01-29T00:00:00
db:BIDid:22222date:2007-01-25T00:00:00
db:JVNDBid:JVNDB-2007-001440date:2012-06-26T00:00:00
db:PACKETSTORMid:52529date:2006-11-28T00:52:20
db:CNNVDid:CNNVD-200701-493date:2007-01-29T00:00:00
db:NVDid:CVE-2007-0463date:2007-01-29T16:28:00