ID

VAR-200803-0014


CVE

CVE-2008-0048


TITLE

Apple Mac OS X of AppKit of NSDocument API Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2008-001225

DESCRIPTION

Stack-based buffer overflow in AppKit in Apple Mac OS X 10.4.11 allows context-dependent attackers to execute arbitrary code via the a long file name to the NSDocument API. Failed attacks will cause denial-of-service conditions. Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier. NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID: 28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044. There is a stack overflow vulnerability in the way the NSDocument API handles filenames, which is not available on most filesystems. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. 1) Multiple boundary errors in AFP client when processing "afp://" URLs can be exploited to cause stack-based buffer overflows when a user connects to a malicious AFP server. Successful exploitation may allow execution of arbitrary code. 2) An error exists in AFP Server when checking Kerberos principal realm names. This can be exploited to make unauthorized connections to the server when cross-realm authentication with AFP Server is used. 3) Multiple vulnerabilities in Apache can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. 6) Multiple integer overflow errors exist in the parser for a legacy serialization format. This can be exploited to cause a heap-based buffer overflow when a specially crafted serialized property list is parsed. Successful exploitation may allow execution of arbitrary code. 7) An error in CFNetwork can be exploited to spoof secure websites via 502 Bad Gateway errors from a malicious HTTPS proxy server. 8) Multiple vulnerabilities in ClamAV can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. For more information: SA23347 SA24187 SA24891 SA26038 SA26530 SA28117 SA28907 9) An integer overflow error exists in CoreFoundation when handling time zone data. 10) The problem is that files with names ending in ".ief" can be automatically opened in AppleWorks if "Open 'Safe' files" is enabled in Safari. 13) A boundary error in curl can be exploited to compromise a user's system. For more information: SA17907 14) A vulnerability in emacs can be exploited by malicious people to compromise a user's system. For more information: SA27508 15) A vulnerability in "file" can be exploited by malicious people to compromise a vulnerable system. For more information: SA24548 16) An input validation error exists in the NSSelectorFromString API, which can potentially be exploited to execute arbitrary code via a malformed selector name. 17) A race condition error in NSFileManager can potentially be exploited to gain escalated privileges. 18) A boundary error in NSFileManager can potentially be exploited to cause a stack-based buffer overflow via an overly long pathname with a specially crafted structure. 19) A race condition error exists in the cache management of NSURLConnection. Safari). 20) A race condition error exists in NSXML. 21) An error in Help Viewer can be exploited to insert arbitrary HTML or JavaScript into the generated topic list page via a specially crafted "help:topic_list" URL and may redirect to a Help Viewer "help:runscript" link that runs Applescript. 22) A boundary error exists in Image Raw within the handling of Adobe Digital Negative (DNG) image files. This can be exploited to cause a stack-based buffer overflow by enticing a user to open a maliciously crafted image file. 23) Multiple vulnerabilities in Kerberos can be exploited to cause a DoS or to compromise a vulnerable system. For more information: SA29428 24) An off-by-one error the "strnstr()" in libc can be exploited to cause a DoS. 25) A format string error exists in mDNSResponderHelper, which can be exploited by a malicious, local user to cause a DoS or execute arbitrary code with privileges of mDNSResponderHelper by setting the local hostname to a specially crafted string. 26) An error in notifyd can be exploited by a malicious, local user to deny access to notifications by sending fake Mach port death notifications to notifyd. 27) An array indexing error in the pax command line tool can be exploited to execute arbitrary code. 28) Multiple vulnerabilities in php can be exploited to bypass certain security restrictions. For more information: SA27648 SA28318 29) A security issue is caused due to the Podcast Capture application providing passwords to a subtask through the arguments. 30) Printing and Preview handle PDF files with weak encryption. 31) An error in Printing in the handling of authenticated print queues can lead to credentials being saved to disk. 33) A null-pointer dereference error exists in the handling of Universal Disc Format (UDF) file systems, which can be exploited to cause a system shutdown by enticing a user to open a maliciously crafted disk image. 35) Some vulnerabilities in X11 can be exploited by malicious, local users to gain escalated privileges. For more information: SA27040 SA28532 36) Some vulnerabilities in libpng can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA22900 SA25292 SA27093 SA27130 SOLUTION: Apply Security Update 2008-002. Security Update 2008-002 v1.0 (PPC): http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html Security Update 2008-002 v1.0 (Universal): http://www.apple.com/support/downloads/securityupdate2008002v10universal.html Security Update 2008-002 v1.0 (Leopard): http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html Security Update 2008-002 v1.0 Server (Leopard): http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html Security Update 2008-002 v1.0 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html Security Update 2008-002 v1.0 Server (Universal): http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm 11) regenrecht via iDefense 19) Daniel Jalkut, Red Sweater Software 22) Brian Mastenbrook 24) Mike Ash, Rogue Amoeba Software 29) Maximilian Reiss, Chair for Applied Software Engineering, TUM 33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega 34) Rodrigo Carvalho CORE Security Technologies ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307562 CORE-2008-0123: http://www.coresecurity.com/?action=item&id=2189 OTHER REFERENCES: SA17907: http://secunia.com/advisories/17907/ SA18008: http://secunia.com/advisories/18008/ SA21187: http://secunia.com/advisories/21197/ SA22900: http://secunia.com/advisories/22900/ SA23347: http://secunia.com/advisories/23347/ SA24187: http://secunia.com/advisories/24187/ SA24548: http://secunia.com/advisories/24548/ SA24891: http://secunia.com/advisories/24891/ SA25292: http://secunia.com/advisories/25292/ SA26038: http://secunia.com/advisories/26038/ SA26530: http://secunia.com/advisories/26530/ SA26636: http://secunia.com/advisories/26636/ SA27040: http://secunia.com/advisories/27040/ SA27093: http://secunia.com/advisories/27093/ SA27130: http://secunia.com/advisories/27130/ SA27648: http://secunia.com/advisories/27648/ SA27508: http://secunia.com/advisories/27508/ SA27906: http://secunia.com/advisories/27906/ SA28046: http://secunia.com/advisories/28046/ SA28117: http://secunia.com/advisories/28117/ SAS28318: http://secunia.com/advisories/28318/ SA28532: http://secunia.com/advisories/28532/ SA28907: http://secunia.com/advisories/28907/ SA29428: http://secunia.com/advisories/29428/ SA29431: http://secunia.com/advisories/29431/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2008-0048 // JVNDB: JVNDB-2008-001225 // BID: 28388 // BID: 28304 // VULHUB: VHN-30173 // PACKETSTORM: 64747

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.11

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.11

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.1.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.6

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.1.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.1.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.1.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.1.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

sources: BID: 28388 // BID: 28304 // JVNDB: JVNDB-2008-001225 // CNNVD: CNNVD-200803-263 // NVD: CVE-2008-0048

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0048
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-0048
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200803-263
value: MEDIUM

Trust: 0.6

VULHUB: VHN-30173
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-0048
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30173
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30173 // JVNDB: JVNDB-2008-001225 // CNNVD: CNNVD-200803-263 // NVD: CVE-2008-0048

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-30173 // JVNDB: JVNDB-2008-001225 // NVD: CVE-2008-0048

THREAT TYPE

network

Trust: 0.6

sources: BID: 28388 // BID: 28304

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200803-263

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001225

PATCH

title:Security Update 2008-002url:http://support.apple.com/kb/HT1249?viewlocale=en_US

Trust: 0.8

title:Security Update 2008-002url:http://support.apple.com/kb/HT1249?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001225

EXTERNAL IDS

db:NVDid:CVE-2008-0048

Trust: 2.8

db:BIDid:28304

Trust: 2.8

db:BIDid:28388

Trust: 2.8

db:SECUNIAid:29420

Trust: 2.6

db:SECTRACKid:1019647

Trust: 2.5

db:USCERTid:TA08-079A

Trust: 2.5

db:VUPENid:ADV-2008-0924

Trust: 1.7

db:USCERTid:SA08-079A

Trust: 0.8

db:JVNDBid:JVNDB-2008-001225

Trust: 0.8

db:CNNVDid:CNNVD-200803-263

Trust: 0.7

db:CERT/CCid:TA08-079A

Trust: 0.6

db:APPLEid:APPLE-SA-2008-03-18

Trust: 0.6

db:XFid:41315

Trust: 0.6

db:VULHUBid:VHN-30173

Trust: 0.1

db:PACKETSTORMid:64747

Trust: 0.1

sources: VULHUB: VHN-30173 // BID: 28388 // BID: 28304 // JVNDB: JVNDB-2008-001225 // PACKETSTORM: 64747 // CNNVD: CNNVD-200803-263 // NVD: CVE-2008-0048

REFERENCES

url:http://www.securityfocus.com/bid/28304

Trust: 2.5

url:http://www.securityfocus.com/bid/28388

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-079a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1019647

Trust: 2.5

url:http://secunia.com/advisories/29420

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=307562

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2008/mar/msg00001.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/0924/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41315

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0048

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/0924

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-079a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-079a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0048

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-079a.html

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/41315

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0924/references

Trust: 0.6

url:http://www.apple.com/server/macosx/

Trust: 0.3

url:http://docs.info.apple.com/article.html?artnum=307430

Trust: 0.3

url:http://www.coresecurity.com/?action=item&id=2189

Trust: 0.1

url:http://secunia.com/advisories/28046/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/27648/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html

Trust: 0.1

url:http://secunia.com/advisories/24891/

Trust: 0.1

url:http://secunia.com/advisories/27093/

Trust: 0.1

url:http://secunia.com/advisories/29431/

Trust: 0.1

url:http://secunia.com/advisories/27906/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008002v10universal.html

Trust: 0.1

url:http://secunia.com/advisories/22900/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:http://secunia.com/advisories/21197/

Trust: 0.1

url:http://secunia.com/advisories/23347/

Trust: 0.1

url:http://secunia.com/advisories/29420/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html

Trust: 0.1

url:http://secunia.com/advisories/26038/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html

Trust: 0.1

url:http://secunia.com/advisories/27130/

Trust: 0.1

url:http://secunia.com/advisories/28532/

Trust: 0.1

url:http://secunia.com/advisories/29428/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/24187/

Trust: 0.1

url:http://secunia.com/advisories/24548/

Trust: 0.1

url:http://secunia.com/advisories/26636/

Trust: 0.1

url:http://secunia.com/advisories/25292/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/18008/

Trust: 0.1

url:http://secunia.com/advisories/27040/

Trust: 0.1

url:http://secunia.com/advisories/27508/

Trust: 0.1

url:http://secunia.com/advisories/28117/

Trust: 0.1

url:http://secunia.com/advisories/28907/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/advisories/17907/

Trust: 0.1

url:http://secunia.com/advisories/26530/

Trust: 0.1

url:http://secunia.com/advisories/28318/

Trust: 0.1

sources: VULHUB: VHN-30173 // BID: 28388 // BID: 28304 // JVNDB: JVNDB-2008-001225 // PACKETSTORM: 64747 // CNNVD: CNNVD-200803-263 // NVD: CVE-2008-0048

CREDITS

Ragnar SundbladregenrechtDaniel JalkutBrian MastenbrookClint RuohoMike Ash

Trust: 0.6

sources: CNNVD: CNNVD-200803-263

SOURCES

db:VULHUBid:VHN-30173
db:BIDid:28388
db:BIDid:28304
db:JVNDBid:JVNDB-2008-001225
db:PACKETSTORMid:64747
db:CNNVDid:CNNVD-200803-263
db:NVDid:CVE-2008-0048

LAST UPDATE DATE

2024-11-23T20:43:29.651000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30173date:2017-08-08T00:00:00
db:BIDid:28388date:2008-03-24T17:20:00
db:BIDid:28304date:2008-03-22T01:10:00
db:JVNDBid:JVNDB-2008-001225date:2008-04-10T00:00:00
db:CNNVDid:CNNVD-200803-263date:2008-10-11T00:00:00
db:NVDid:CVE-2008-0048date:2024-11-21T00:41:02.603

SOURCES RELEASE DATE

db:VULHUBid:VHN-30173date:2008-03-18T00:00:00
db:BIDid:28388date:2008-03-21T00:00:00
db:BIDid:28304date:2008-03-18T00:00:00
db:JVNDBid:JVNDB-2008-001225date:2008-04-10T00:00:00
db:PACKETSTORMid:64747date:2008-03-20T20:39:31
db:CNNVDid:CNNVD-200803-263date:2008-03-18T00:00:00
db:NVDid:CVE-2008-0048date:2008-03-18T22:44:00