var-200606-0402
Vulnerability from variot
Format string vulnerability in the CF_syslog function launchd in Apple Mac OS X 10.4 up to 10.4.6 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a syslog call in the logging facility, as demonstrated by using a crafted plist file. Apple Mac OS X 'launchd' is prone to a local format-string vulnerability. A local attacker can exploit this issue through a malicious 'plist' file that includes externally supplied format specifiers that will be passed to the vulnerable code. A successful attack may crash the application or lead to arbitrary code execution. This issue was initially discussed in BID 18686 (Apple Mac OS X Multiple Security Vulnerabilities). The vulnerability exists specifically in the logging tool of launchd.
Reverse Engineer Wanted
Secunia offers a Security Specialist position with emphasis on reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
1) An error in the AFP server within the handling of users' search results can be exploited by malicious users to gain knowledge of the names of files and folders for which the user performing the search has no access to.
2) A vulnerability within the Freshclam command line utility in ClamAV can potentially be exploited to compromise a vulnerable system.
For more information: SA19880
3) A boundary error in ImageIO within the handling of TIFF images can be exploited to cause a stack-based buffer overflow.
5) An error within "slapd" of the OpenLDAP server when handling an anonymous bind operation can be exploited to crash the service via a malformed ldap-bind message.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200606-0402",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.6"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.3"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.4"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.5"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.6"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4.3"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.7"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "18724"
      },
      {
        "db": "BID",
        "id": "18686"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-1471",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2006-1471",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-17579",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-1471",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200606-527",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-17579",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2006-1471",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-1471"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Format string vulnerability in the CF_syslog function launchd in Apple Mac OS X 10.4 up to 10.4.6 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a syslog call in the logging facility, as demonstrated by using a crafted plist file. Apple Mac OS X \u0027launchd\u0027 is prone to a local format-string vulnerability. A local attacker can exploit this issue through a malicious \u0027plist\u0027 file that includes externally supplied format specifiers that will be passed to the vulnerable code. \nA successful attack may crash the application or lead to arbitrary code execution. \nThis issue was initially discussed in BID 18686 (Apple Mac OS X Multiple Security Vulnerabilities). The vulnerability exists specifically in the logging tool of launchd. \n\n----------------------------------------------------------------------\n\nReverse Engineer Wanted\n\nSecunia offers a Security Specialist position with emphasis on\nreverse engineering of software and exploit code, auditing of\nsource code, and analysis of vulnerability reports. \n\n1) An error in the AFP server within the handling of users\u0027 search\nresults can be exploited by malicious users to gain knowledge of the\nnames of files and folders for which the user performing the search\nhas no access to. \n\n2) A vulnerability within the Freshclam command line utility in\nClamAV can potentially be exploited to compromise a vulnerable\nsystem. \n\nFor more information:\nSA19880\n\n3) A boundary error in ImageIO within the handling of TIFF images can\nbe exploited to cause a stack-based buffer overflow. \n\n5) An error within \"slapd\" of the OpenLDAP server when handling an\nanonymous bind operation can be exploited to crash the service via a\nmalformed ldap-bind message. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-1471"
      },
      {
        "db": "BID",
        "id": "18724"
      },
      {
        "db": "BID",
        "id": "18686"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-1471"
      },
      {
        "db": "PACKETSTORM",
        "id": "47895"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-1471",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "18724",
        "trust": 2.1
      },
      {
        "db": "BID",
        "id": "18686",
        "trust": 2.1
      },
      {
        "db": "SECUNIA",
        "id": "20877",
        "trust": 1.9
      },
      {
        "db": "OSVDB",
        "id": "26933",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1016397",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-2566",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "27479",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2006-06-27",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20060629 DMA[2006-0628A] - \u0027APPLE OSX LAUNCHD UNFORMATTED SYSLOG() VULNERABILITY\u0027",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-17579",
        "trust": 0.1
      },
      {
        "db": "VUPEN",
        "id": "2006/2566",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-1471",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "47895",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-1471"
      },
      {
        "db": "BID",
        "id": "18724"
      },
      {
        "db": "BID",
        "id": "18686"
      },
      {
        "db": "PACKETSTORM",
        "id": "47895"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "id": "VAR-200606-0402",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17579"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:48:09.792000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Securelist",
        "trust": 0.1,
        "url": "https://securelist.com/kaspersky-security-bulletin-2006-malware-for-unix-type-systems/36131/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-134",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/18724"
      },
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/archives/security-announce/2006/jun/msg00000.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/18686"
      },
      {
        "trust": 1.8,
        "url": "http://www.osvdb.org/26933"
      },
      {
        "trust": 1.8,
        "url": "http://securitytracker.com/id?1016397"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/20877"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/438699/100/0/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.vupen.com/english/advisories/2006/2566"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27479"
      },
      {
        "trust": 0.6,
        "url": "http://www.apple.com/support/downloads/"
      },
      {
        "trust": 0.6,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/438699/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/2566"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/27479"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/134.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://securelist.com/kaspersky-security-bulletin-2006-malware-for-unix-type-systems/36131/"
      },
      {
        "trust": 0.1,
        "url": "http://labs.musecurity.com/advisories/mu-200606-02.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/19880/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/macosxupdate1047intel.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_specialist/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20877/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://docs.info.apple.com/article.html?artnum=303973"
      },
      {
        "trust": 0.1,
        "url": "http://www.digitalmunition.com/dma%5b2006-0628a%5d.txt"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/macosxserverupdate1047.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/macosxupdate1047ppc.html"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-1471"
      },
      {
        "db": "BID",
        "id": "18724"
      },
      {
        "db": "BID",
        "id": "18686"
      },
      {
        "db": "PACKETSTORM",
        "id": "47895"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-17579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-1471"
      },
      {
        "db": "BID",
        "id": "18724"
      },
      {
        "db": "BID",
        "id": "18686"
      },
      {
        "db": "PACKETSTORM",
        "id": "47895"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-06-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17579"
      },
      {
        "date": "2006-06-27T00:00:00",
        "db": "VULMON",
        "id": "CVE-2006-1471"
      },
      {
        "date": "2006-06-29T00:00:00",
        "db": "BID",
        "id": "18724"
      },
      {
        "date": "2006-06-27T00:00:00",
        "db": "BID",
        "id": "18686"
      },
      {
        "date": "2006-06-29T18:48:34",
        "db": "PACKETSTORM",
        "id": "47895"
      },
      {
        "date": "2006-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      },
      {
        "date": "2006-06-27T22:13:00",
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17579"
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "VULMON",
        "id": "CVE-2006-1471"
      },
      {
        "date": "2006-07-04T19:04:00",
        "db": "BID",
        "id": "18724"
      },
      {
        "date": "2006-06-30T15:44:00",
        "db": "BID",
        "id": "18686"
      },
      {
        "date": "2006-07-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      },
      {
        "date": "2024-11-21T00:08:57.250000",
        "db": "NVD",
        "id": "CVE-2006-1471"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "18724"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS X  CF_syslog function Format string vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "format string",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200606-527"
      }
    ],
    "trust": 0.6
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.