ID

VAR-200705-0515


CVE

CVE-2007-2386


TITLE

Apple Mac OS X mDNSResponder buffer overflow vulnerability

Trust: 0.8

sources: CERT/CC: VU#221876

DESCRIPTION

Buffer overflow in mDNSResponder in Apple Mac OS X 10.4 up to 10.4.9 allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted UPnP Internet Gateway Device (IGD) packet. Successfully exploiting this issue allows remote attackers to execute arbitrary machine code with superuser privileges, facilitating the complete compromise of affected computers. Failed exploit attempts likely result in a denial-of-service condition. Apple Mac OS X 10.4.0 through 10.4.9 are vulnerable to this issue. The vendor reports this issue also affects Apple TV versions prior to 1.1. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: mDNSResponder: Multiple vulnerabilities Date: January 20, 2012 Bugs: #290822 ID: 201201-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in mDNSResponder, which could lead to execution of arbitrary code with root privileges. Background ========== mDNSResponder is a component of Apple's Bonjour, an initiative for zero-configuration networking. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/mDNSResponder < 212.1 >= 212.1 Description =========== Multiple vulnerabilities have been discovered in mDNSResponder. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All mDNSResponder users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/mDNSResponder-212.1" NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 21, 2009. It is likely that your system is already no longer affected by this issue. References ========== [ 1 ] CVE-2007-2386 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386 [ 2 ] CVE-2007-3744 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744 [ 3 ] CVE-2007-3828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828 [ 4 ] CVE-2008-0989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989 [ 5 ] CVE-2008-2326 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326 [ 6 ] CVE-2008-3630 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201201-05.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.79

sources: NVD: CVE-2007-2386 // CERT/CC: VU#221876 // JVNDB: JVNDB-2007-001935 // BID: 24159 // VULHUB: VHN-25748 // PACKETSTORM: 108968

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.6

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.4 to 10.4.9

Trust: 0.8

vendor:applemodel:tvscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:tvscope:neversion:1.1

Trust: 0.3

sources: CERT/CC: VU#221876 // BID: 24159 // JVNDB: JVNDB-2007-001935 // CNNVD: CNNVD-200705-487 // NVD: CVE-2007-2386

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2386
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#221876
value: 6.09

Trust: 0.8

NVD: CVE-2007-2386
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200705-487
value: CRITICAL

Trust: 0.6

VULHUB: VHN-25748
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2386
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25748
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#221876 // VULHUB: VHN-25748 // JVNDB: JVNDB-2007-001935 // CNNVD: CNNVD-200705-487 // NVD: CVE-2007-2386

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2386

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200705-487

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200705-487

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001935

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-25748

PATCH

title:APPLE-SA-2007-05-24url:http://lists.apple.com/archives/security-announce/2007/May/msg00004.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-001935

EXTERNAL IDS

db:CERT/CCid:VU#221876

Trust: 3.0

db:NVDid:CVE-2007-2386

Trust: 2.9

db:VUPENid:ADV-2007-1939

Trust: 1.7

db:SECUNIAid:25402

Trust: 1.7

db:BIDid:24144

Trust: 1.7

db:BIDid:24159

Trust: 1.4

db:VUPENid:ADV-2007-2269

Trust: 1.1

db:SECUNIAid:25745

Trust: 1.1

db:SECTRACKid:1018123

Trust: 1.1

db:OSVDBid:35142

Trust: 1.1

db:JVNDBid:JVNDB-2007-001935

Trust: 0.8

db:CNNVDid:CNNVD-200705-487

Trust: 0.7

db:APPLEid:APPLE-SA-2007-05-24

Trust: 0.6

db:XFid:34498

Trust: 0.6

db:SECTRACKid:1018121

Trust: 0.6

db:OSVDBid:35147

Trust: 0.6

db:PACKETSTORMid:108968

Trust: 0.2

db:EXPLOIT-DBid:16871

Trust: 0.1

db:SEEBUGid:SSVID-71368

Trust: 0.1

db:SEEBUGid:SSVID-88773

Trust: 0.1

db:VULHUBid:VHN-25748

Trust: 0.1

sources: CERT/CC: VU#221876 // VULHUB: VHN-25748 // BID: 24159 // JVNDB: JVNDB-2007-001935 // PACKETSTORM: 108968 // CNNVD: CNNVD-200705-487 // NVD: CVE-2007-2386

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=305530

Trust: 2.8

url:http://www.kb.cert.org/vuls/id/221876

Trust: 2.2

url:http://lists.apple.com/archives/security-announce/2007/may/msg00004.html

Trust: 1.7

url:http://www.securityfocus.com/bid/24144

Trust: 1.7

url:http://secunia.com/advisories/25402

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2007/jun/msg00001.html

Trust: 1.1

url:http://www.securityfocus.com/bid/24159

Trust: 1.1

url:http://www.osvdb.org/35142

Trust: 1.1

url:http://www.securitytracker.com/id?1018123

Trust: 1.1

url:http://secunia.com/advisories/25745

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/1939

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2269

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34493

Trust: 1.1

url:http://developer.apple.com/networking/bonjour/faq.html

Trust: 0.8

url:http://docs.info.apple.com/article.html?path=serveradmin/10.4/en/c4ns11.html

Trust: 0.8

url:http://www.apple.com/appletv/

Trust: 0.8

url:http://www.iss.net/threats/264.html

Trust: 0.8

url:http://www.upnp.org/standardizeddcps/igd.asp

Trust: 0.8

url:http://en.wikipedia.org/wiki/ip_multicast

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=305631

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2386

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-2386

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/34498

Trust: 0.6

url:http://www.securitytracker.com/id?1018121

Trust: 0.6

url:http://www.osvdb.org/35147

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/1939

Trust: 0.6

url:http://lists.immunitysec.com/pipermail/dailydave/2007-may/004360.html

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2008-0989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3630

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3828

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2326

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3828

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3744

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201201-05.xml

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2326

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3744

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3630

Trust: 0.1

sources: CERT/CC: VU#221876 // VULHUB: VHN-25748 // BID: 24159 // JVNDB: JVNDB-2007-001935 // PACKETSTORM: 108968 // CNNVD: CNNVD-200705-487 // NVD: CVE-2007-2386

CREDITS

Chris Anley※ chrisanley@hushmail.com

Trust: 0.6

sources: CNNVD: CNNVD-200705-487

SOURCES

db:CERT/CCid:VU#221876
db:VULHUBid:VHN-25748
db:BIDid:24159
db:JVNDBid:JVNDB-2007-001935
db:PACKETSTORMid:108968
db:CNNVDid:CNNVD-200705-487
db:NVDid:CVE-2007-2386

LAST UPDATE DATE

2024-11-23T20:47:51.887000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#221876date:2007-06-20T00:00:00
db:VULHUBid:VHN-25748date:2017-07-29T00:00:00
db:BIDid:24159date:2007-11-03T01:26:00
db:JVNDBid:JVNDB-2007-001935date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200705-487date:2007-05-29T00:00:00
db:NVDid:CVE-2007-2386date:2024-11-21T00:30:39.523

SOURCES RELEASE DATE

db:CERT/CCid:VU#221876date:2007-05-25T00:00:00
db:VULHUBid:VHN-25748date:2007-05-24T00:00:00
db:BIDid:24159date:2007-05-24T00:00:00
db:JVNDBid:JVNDB-2007-001935date:2012-06-26T00:00:00
db:PACKETSTORMid:108968date:2012-01-23T16:17:51
db:CNNVDid:CNNVD-200705-487date:2007-05-24T00:00:00
db:NVDid:CVE-2007-2386date:2007-05-24T22:30:00