var-200611-0488
Vulnerability from variot
Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a malformed UDTO HFS+ disk image, such as with "bad sectors," which triggers memory corruption. Apple Mac OS X fails to properly handle corrupted UDTO HFS+ image structures. This vulnerability may allow an attacker to cause a denial-of-service condition. Successfully exploiting this issue allows remote users to crash affected computers, denying service to legitimate users. Mac OS X version 10.4.8 is vulnerable to this issue; other versions may also be affected. Note: Further information from Alastair Houghton reports that this issue cannot be exploited to execute arbitrary code. See the references for details. Attackers may also be able to exploit this issue for remote code execution, but this is reportedly unlikely
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200611-0488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.8" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.9" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.9" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os server", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "x10.4.9" } ], "sources": [ { "db": "CERT/CC", "id": "VU#214040" }, { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" }, { "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "db": "CNNVD", "id": "CNNVD-200611-367" }, { "db": "NVD", "id": "CVE-2006-6062" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000941" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "LMH \u003clmh@info-pull.com\u003e discovered this issue.", "sources": [ { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" } ], "trust": 0.6 }, "cve": "CVE-2006-6062", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2006-6062", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "VHN-22170", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-6062", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#214040", "trust": 0.8, "value": "5.57" }, { "author": "NVD", "id": "CVE-2006-6062", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200611-367", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-22170", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#214040" }, { "db": "VULHUB", "id": "VHN-22170" }, { "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "db": "CNNVD", "id": "CNNVD-200611-367" }, { "db": "NVD", "id": "CVE-2006-6062" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a malformed UDTO HFS+ disk image, such as with \"bad sectors,\" which triggers memory corruption. Apple Mac OS X fails to properly handle corrupted UDTO HFS+ image structures. This vulnerability may allow an attacker to cause a denial-of-service condition. \nSuccessfully exploiting this issue allows remote users to crash affected computers, denying service to legitimate users. \nMac OS X version 10.4.8 is vulnerable to this issue; other versions may also be affected. \nNote: Further information from Alastair Houghton reports that this issue cannot be exploited to execute arbitrary code. See the references for details. Attackers may also be able to exploit this issue for remote code execution, but this is reportedly unlikely", "sources": [ { "db": "NVD", "id": "CVE-2006-6062" }, { "db": "CERT/CC", "id": "VU#214040" }, { "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" }, { "db": "VULHUB", "id": "VHN-22170" } ], "trust": 2.97 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-22170", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-22170" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-6062", "trust": 3.9 }, { "db": "BID", "id": "21201", "trust": 3.6 }, { "db": "BID", "id": "21236", "trust": 2.8 }, { "db": "SECUNIA", "id": "23062", "trust": 2.5 }, { "db": "SECUNIA", "id": "24479", "trust": 2.5 }, { "db": "SECTRACK", "id": "1017751", "trust": 2.5 }, { "db": "USCERT", "id": "TA07-072A", "trust": 2.5 }, { "db": "SECUNIA", "id": "23012", "trust": 2.5 }, { "db": "OSVDB", "id": "30510", "trust": 2.5 }, { "db": "CERT/CC", "id": "VU#214040", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2006-4653", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-4629", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-0930", "trust": 1.7 }, { "db": "SECTRACK", "id": "1017260", "trust": 1.7 }, { "db": "XF", "id": "30463", "trust": 1.4 }, { "db": "USCERT", "id": "SA07-072A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2006-000941", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200611-367", "trust": 0.7 }, { "db": "XF", "id": "30440", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2007-03-13", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA07-072A", "trust": 0.6 }, { "db": "CERT/CC", "id": "VU#367424", "trust": 0.3 }, { "db": "SEEBUG", "id": "SSVID-82677", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-82692", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "29144", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "29161", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-22170", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#214040" }, { "db": "VULHUB", "id": "VHN-22170" }, { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" }, { "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "db": "CNNVD", "id": "CNNVD-200611-367" }, { "db": "NVD", "id": "CVE-2006-6062" } ] }, "id": "VAR-200611-0488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-22170" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:32:37.602000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Update 2007-003 (10.3.9 Client)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate20070031039client.html" }, { "title": "Security Update 2007-003 (10.3.9 Server)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate20070031039server.html" }, { "title": "Security Update 2007-003", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305214-en" }, { "title": "Security Update 2007-003", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305214-ja" }, { "title": "Security Update 2007-003 (10.3.9 Client)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate20070031039client.html" }, { "title": "Security Update 2007-003 (10.3.9 Server)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate20070031039server.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-000941" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-6062" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://www.securityfocus.com/bid/21201" }, { "trust": 2.5, "url": "http://projects.info-pull.com/mokb/mokb-21-11-2006.html" }, { "trust": 2.5, "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/21236" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta07-072a.html" }, { "trust": 2.5, "url": "http://www.osvdb.org/30510" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2007/mar/msg00002.html" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1017260" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1017751" }, { "trust": 1.7, "url": "http://secunia.com/advisories/23012" }, { "trust": 1.7, "url": "http://secunia.com/advisories/23062" }, { "trust": 1.7, "url": "http://secunia.com/advisories/24479" }, { "trust": 1.6, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6062" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2006/4629" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/30463" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/4629" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/4653" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30440" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30463" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/214040" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23062/" }, { "trust": 0.8, "url": "http://en.wikipedia.org/wiki/hfs_plus" }, { "trust": 0.8, "url": "http://secunia.com/advisories/24479/" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2007/mar/1017751.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta07-072a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta07-072a/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-6062" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23012/" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa07-072a.html" }, { "trust": 0.6, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.6, "url": "http://www.apple.com/macosx/" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/30440" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/4653" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/0930" }, { "trust": 0.3, "url": "http://alastairs-place.net/2006/11/dmg-vulnerability/" }, { "trust": 0.3, "url": "http://kernelfun.blogspot.com/2006/11/mokb-20-11-2006-mac-os-x-apple-udif.html" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/367424" }, { "trust": 0.3, "url": "http://kernelfun.blogspot.com/2006/11/mokb-21-11-2006-mac-os-x-apple-udto-hfs.html" } ], "sources": [ { "db": "CERT/CC", "id": "VU#214040" }, { "db": "VULHUB", "id": "VHN-22170" }, { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" }, { "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "db": "CNNVD", "id": "CNNVD-200611-367" }, { "db": "NVD", "id": "CVE-2006-6062" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#214040" }, { "db": "VULHUB", "id": "VHN-22170" }, { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" }, { "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "db": "CNNVD", "id": "CNNVD-200611-367" }, { "db": "NVD", "id": "CVE-2006-6062" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-13T00:00:00", "db": "CERT/CC", "id": "VU#214040" }, { "date": "2006-11-22T00:00:00", "db": "VULHUB", "id": "VHN-22170" }, { "date": "2006-11-20T00:00:00", "db": "BID", "id": "21201" }, { "date": "2006-11-21T00:00:00", "db": "BID", "id": "21236" }, { "date": "2007-04-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "date": "2006-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200611-367" }, { "date": "2006-11-22T01:07:00", "db": "NVD", "id": "CVE-2006-6062" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-22T00:00:00", "db": "CERT/CC", "id": "VU#214040" }, { "date": "2017-07-20T00:00:00", "db": "VULHUB", "id": "VHN-22170" }, { "date": "2007-03-15T03:34:00", "db": "BID", "id": "21201" }, { "date": "2007-03-15T03:34:00", "db": "BID", "id": "21236" }, { "date": "2007-04-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-000941" }, { "date": "2006-11-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200611-367" }, { "date": "2024-11-21T00:21:38.753000", "db": "NVD", "id": "CVE-2006-6062" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X fails to properly handle corrupted UDTO HFS+ image structures", "sources": [ { "db": "CERT/CC", "id": "VU#214040" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "21201" }, { "db": "BID", "id": "21236" }, { "db": "CNNVD", "id": "CNNVD-200611-367" } ], "trust": 1.2 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.