var-200712-0161
Vulnerability from variot
The accept_connections function in the virtual private network daemon (vpnd) in Apple Mac OS X 10.5 before 10.5.4 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted load balancing packet to UDP port 4112. An attacker can exploit this issue to crash affected computers, denying service to legitimate users. This issue affects Apple Mac OS X 10.5; other versions may also be affected.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
The vulnerability is caused due to an error within vpnd when handling connections and can be exploited to stop the VPN daemon by sending a specially crafted packet to the service. Other versions may also be affected.
SOLUTION: Restrict network access to the VPN daemon to trusted clients.
PROVIDED AND/OR DISCOVERED BY: mu-b
ORIGINAL ADVISORY: http://milw0rm.com/exploits/4690
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. ----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/
International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/
TITLE: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA30802
VERIFY ADVISORY: http://secunia.com/advisories/30802/
CRITICAL: Highly critical
IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access
WHERE:
From remote
OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/
DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities and a weakness.
1) An unspecified error in the Alias Manager when handling AFP volume mount information in an alias data structure can be exploited to cause a memory corruption and potentially execute arbitrary code.
2) A weakness is caused due to users not being warned before opening certain potentially unsafe content types, e.g. .xht and .xhtm files.
3) A format string error in c++filt can be exploited to exploited to execute arbitrary code when a specially crafted string is passed to the application.
4) An vulnerability in Dock can be exploited by malicious people with physical access to a system to bypass the screen lock when Expos\xe9 hot corners are set.
5) A race condition error exists in Launch Services in the download validation of symbolic links. This can be exploited to execute arbitrary code when a user visits a malicious web site.
Successful exploitation requires that the "Open 'safe' files" option is enabled in Safari.
6) A vulnerability in Net-SNMP can be exploited by malicious people to spoof authenticated SNMPv3 packets.
For more information: SA30574
7) Some vulnerabilities in Ruby can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.
8) A vulnerability in SMB File Server can be exploited by malicious people to compromise a vulnerable system.
For more information: SA30228
9) It is possible to store malicious files within the User Template directory. This can be exploited to execute arbitrary code with permissions of a new user when his home directory is created using the User Template directory.
10) Some vulnerabilities in Tomcat can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information or to conduct cross-site scripting attacks.
For more information: SA25678 SA26466 SA27398 SA28878
11) A vulnerability in WebKit can be exploited by malicious people to compromise a user's system. or apply Security Update 2008-004.
Security Update 2008-004 (PPC): http://www.apple.com/support/downloads/securityupdate2008004ppc.html
Security Update 2008-004 (Intel): http://www.apple.com/support/downloads/securityupdate2008004intel.html
Security Update 2008-004 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008004serverppc.html
Security Update 2008-004 Server (Intel): http://www.apple.com/support/downloads/securityupdate2008004serverintel.html
Mac OS X 10.5.4 Combo Update: http://www.apple.com/support/downloads/macosx1054comboupdate.html
Mac OS X 10.5.4 Update: http://www.apple.com/support/downloads/macosx1054update.html
Mac OS X Server 10.5.4: http://www.apple.com/support/downloads/macosxserver1054.html
Mac OS X Server Combo 10.5.4: http://www.apple.com/support/downloads/macosxservercombo1054.html
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 2) Brian Mastenbrook 4) Andrew Cassell, Marine Spill Response Corporation 8) Alin Rad Pop, Secunia Research 9) Andrew Mortensen, University of Michigan 11) James Urquhart
ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT2163
OTHER REFERENCES: SA25678: http://secunia.com/advisories/25678/
SA26466: http://secunia.com/advisories/26466/
SA27398: http://secunia.com/advisories/27398/
SA28878: http://secunia.com/advisories/28878/
SA29232: http://secunia.com/advisories/29232/
SA29794: http://secunia.com/advisories/29794/
SA30228: http://secunia.com/advisories/30228/
SA30574: http://secunia.com/advisories/30574/
SA30775: http://secunia.com/advisories/30775/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200712-0161", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.3" }, { "model": "mac os x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.5.4" }, { "model": "mac os x server", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.5.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" } ], "sources": [ { "db": "BID", "id": "26699" }, { "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "db": "CNNVD", "id": "CNNVD-200712-066" }, { "db": "NVD", "id": "CVE-2007-6276" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001179" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "mu-b mu-b@digit-labs.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200712-066" } ], "trust": 0.6 }, "cve": "CVE-2007-6276", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2007-6276", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-29638", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-6276", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2007-6276", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200712-066", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-29638", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-29638" }, { "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "db": "CNNVD", "id": "CNNVD-200712-066" }, { "db": "NVD", "id": "CVE-2007-6276" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The accept_connections function in the virtual private network daemon (vpnd) in Apple Mac OS X 10.5 before 10.5.4 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted load balancing packet to UDP port 4112. \nAn attacker can exploit this issue to crash affected computers, denying service to legitimate users. \nThis issue affects Apple Mac OS X 10.5; other versions may also be affected. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nThe vulnerability is caused due to an error within vpnd when handling\nconnections and can be exploited to stop the VPN daemon by sending a\nspecially crafted packet to the service. \nOther versions may also be affected. \n\nSOLUTION:\nRestrict network access to the VPN daemon to trusted clients. \n\nPROVIDED AND/OR DISCOVERED BY:\nmu-b\n\nORIGINAL ADVISORY:\nhttp://milw0rm.com/exploits/4690\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. ----------------------------------------------------------------------\n\nWant a new job?\n\nhttp://secunia.com/secunia_security_specialist/\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\nInternational Partner Manager - Project Sales in the IT-Security\nIndustry:\nhttp://corporate.secunia.com/about_secunia/64/\n\n----------------------------------------------------------------------\n\nTITLE:\nApple Mac OS X Security Update Fixes Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA30802\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/30802/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSecurity Bypass, Cross Site Scripting, Spoofing, Exposure of\nsensitive information, Privilege escalation, DoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nApple has issued a security update for Mac OS X, which fixes multiple\nvulnerabilities and a weakness. \n\n1) An unspecified error in the Alias Manager when handling AFP volume\nmount information in an alias data structure can be exploited to cause\na memory corruption and potentially execute arbitrary code. \n\n2) A weakness is caused due to users not being warned before opening\ncertain potentially unsafe content types, e.g. .xht and .xhtm files. \n\n3) A format string error in c++filt can be exploited to exploited to\nexecute arbitrary code when a specially crafted string is passed to\nthe application. \n\n4) An vulnerability in Dock can be exploited by malicious people with\nphysical access to a system to bypass the screen lock when Expos\\xe9 hot\ncorners are set. \n\n5) A race condition error exists in Launch Services in the download\nvalidation of symbolic links. This can be exploited to execute\narbitrary code when a user visits a malicious web site. \n\nSuccessful exploitation requires that the \"Open \u0027safe\u0027 files\" option\nis enabled in Safari. \n\n6) A vulnerability in Net-SNMP can be exploited by malicious people\nto spoof authenticated SNMPv3 packets. \n\nFor more information:\nSA30574\n\n7) Some vulnerabilities in Ruby can be exploited by malicious people\nto disclose sensitive information, cause a DoS (Denial of Service),\nor potentially compromise a vulnerable system. \n\n8) A vulnerability in SMB File Server can be exploited by malicious\npeople to compromise a vulnerable system. \n\nFor more information:\nSA30228\n\n9) It is possible to store malicious files within the User Template\ndirectory. This can be exploited to execute arbitrary code with\npermissions of a new user when his home directory is created using\nthe User Template directory. \n\n10) Some vulnerabilities in Tomcat can be exploited by malicious\nusers to disclose sensitive information and by malicious people to\ndisclose sensitive information or to conduct cross-site scripting\nattacks. \n\nFor more information:\nSA25678\nSA26466\nSA27398\nSA28878\n\n11) A vulnerability in WebKit can be exploited by malicious people to\ncompromise a user\u0027s system. or apply Security Update 2008-004. \n\nSecurity Update 2008-004 (PPC):\nhttp://www.apple.com/support/downloads/securityupdate2008004ppc.html\n\nSecurity Update 2008-004 (Intel):\nhttp://www.apple.com/support/downloads/securityupdate2008004intel.html\n\nSecurity Update 2008-004 Server (PPC):\nhttp://www.apple.com/support/downloads/securityupdate2008004serverppc.html\n\nSecurity Update 2008-004 Server (Intel):\nhttp://www.apple.com/support/downloads/securityupdate2008004serverintel.html\n\nMac OS X 10.5.4 Combo Update:\nhttp://www.apple.com/support/downloads/macosx1054comboupdate.html\n\nMac OS X 10.5.4 Update:\nhttp://www.apple.com/support/downloads/macosx1054update.html\n\nMac OS X Server 10.5.4:\nhttp://www.apple.com/support/downloads/macosxserver1054.html\n\nMac OS X Server Combo 10.5.4:\nhttp://www.apple.com/support/downloads/macosxservercombo1054.html\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n2) Brian Mastenbrook\n4) Andrew Cassell, Marine Spill Response Corporation\n8) Alin Rad Pop, Secunia Research\n9) Andrew Mortensen, University of Michigan\n11) James Urquhart\n\nORIGINAL ADVISORY:\nApple:\nhttp://support.apple.com/kb/HT2163\n\nOTHER REFERENCES:\nSA25678:\nhttp://secunia.com/advisories/25678/\n\nSA26466:\nhttp://secunia.com/advisories/26466/\n\nSA27398:\nhttp://secunia.com/advisories/27398/\n\nSA28878:\nhttp://secunia.com/advisories/28878/\n\nSA29232:\nhttp://secunia.com/advisories/29232/\n\nSA29794:\nhttp://secunia.com/advisories/29794/\n\nSA30228:\nhttp://secunia.com/advisories/30228/\n\nSA30574:\nhttp://secunia.com/advisories/30574/\n\nSA30775:\nhttp://secunia.com/advisories/30775/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-6276" }, { "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "db": "BID", "id": "26699" }, { "db": "VULHUB", "id": "VHN-29638" }, { "db": "PACKETSTORM", "id": "61554" }, { "db": "PACKETSTORM", "id": "67844" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-29638", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-29638" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-6276", "trust": 2.8 }, { "db": "BID", "id": "26699", "trust": 2.8 }, { "db": "SECUNIA", "id": "27938", "trust": 2.7 }, { "db": "SECTRACK", "id": "1019052", "trust": 2.5 }, { "db": "SECUNIA", "id": "30802", "trust": 1.8 }, { "db": "EXPLOIT-DB", "id": "4690", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-4145", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-1981", "trust": 1.7 }, { "db": "XF", "id": "38855", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2007-001179", "trust": 0.8 }, { "db": "NSFOCUS", "id": "11252", "trust": 0.6 }, { "db": "MILW0RM", "id": "4690", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2008-06-30", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200712-066", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-29638", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "61554", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67844", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-29638" }, { "db": "BID", "id": "26699" }, { "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "db": "PACKETSTORM", "id": "61554" }, { "db": "PACKETSTORM", "id": "67844" }, { "db": "CNNVD", "id": "CNNVD-200712-066" }, { "db": "NVD", "id": "CVE-2007-6276" } ] }, "id": "VAR-200712-0161", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-29638" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:48:19.939000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Update 2008-004", "trust": 0.8, "url": "http://support.apple.com/kb/HT2163" }, { "title": "Security Update 2008-004", "trust": 0.8, "url": "http://support.apple.com/kb/HT2163?viewlocale=ja_JP\u0026locale=ja_JP" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-29638" }, { "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "db": "NVD", "id": "CVE-2007-6276" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/26699" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1019052" }, { "trust": 2.5, "url": "http://secunia.com/advisories/27938" }, { "trust": 2.1, "url": "http://support.apple.com/kb/ht2163" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2008//jun/msg00002.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30802" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/4145" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/38855" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/4690" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/4145" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38855" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6276" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-6276" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/4690" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1981/references" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/11252" }, { "trust": 0.3, "url": "http://software.cisco.com/download/navigator.html?mdfid=283613663" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/product/96/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27938/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv" }, { "trust": 0.1, "url": "http://milw0rm.com/exploits/4690" }, { "trust": 0.1, "url": "http://corporate.secunia.com/about_secunia/64/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008004serverppc.html" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008004intel.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30574/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29794/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008004ppc.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosx1054update.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27398/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosxservercombo1054.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008004serverintel.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosx1054comboupdate.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosxserver1054.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30802/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29232/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/25678/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28878/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30775/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26466/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30228/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-29638" }, { "db": "BID", "id": "26699" }, { "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "db": "PACKETSTORM", "id": "61554" }, { "db": "PACKETSTORM", "id": "67844" }, { "db": "CNNVD", "id": "CNNVD-200712-066" }, { "db": "NVD", "id": "CVE-2007-6276" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-29638" }, { "db": "BID", "id": "26699" }, { "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "db": "PACKETSTORM", "id": "61554" }, { "db": "PACKETSTORM", "id": "67844" }, { "db": "CNNVD", "id": "CNNVD-200712-066" }, { "db": "NVD", "id": "CVE-2007-6276" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-12-07T00:00:00", "db": "VULHUB", "id": "VHN-29638" }, { "date": "2007-12-04T00:00:00", "db": "BID", "id": "26699" }, { "date": "2008-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "date": "2007-12-07T16:22:07", "db": "PACKETSTORM", "id": "61554" }, { "date": "2008-07-02T17:42:37", "db": "PACKETSTORM", "id": "67844" }, { "date": "2007-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200712-066" }, { "date": "2007-12-07T11:46:00", "db": "NVD", "id": "CVE-2007-6276" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-29638" }, { "date": "2008-07-02T20:30:00", "db": "BID", "id": "26699" }, { "date": "2008-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001179" }, { "date": "2008-12-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200712-066" }, { "date": "2024-11-21T00:39:45.523000", "db": "NVD", "id": "CVE-2007-6276" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200712-066" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X VPND Remote Denial of Service Vulnerability", "sources": [ { "db": "BID", "id": "26699" }, { "db": "CNNVD", "id": "CNNVD-200712-066" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200712-066" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.