var-200803-0232
Vulnerability from variot

Format string vulnerability in mDNSResponderHelper in Apple Mac OS X 10.5.2 allows local users to execute arbitrary code via format string specifiers in the local hostname. This occurs because 'mDNSResponderHelper' fails to adequately sanitize user-supplied input before passing it to a formatted-printing function. Failed exploit attempts will likely result in a denial of service. Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier. NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID: 28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044. 28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994 28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048 28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049 28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057 28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997 28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046 28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051 28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052 28334 CUPS Multiple Unspecified Input Validation Vulnerabilities 28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability 28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability 28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability 28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability 28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability 28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability 28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability 28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability 28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness 28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness 28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability 28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability 28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability 28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability 28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability 28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability 28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. There is a format string vulnerability in mDNSResponderHelper. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-05


                                        http://security.gentoo.org/

Severity: High Title: mDNSResponder: Multiple vulnerabilities Date: January 20, 2012 Bugs: #290822 ID: 201201-05


Synopsis

Multiple vulnerabilities have been found in mDNSResponder, which could lead to execution of arbitrary code with root privileges.

Background

mDNSResponder is a component of Apple's Bonjour, an initiative for zero-configuration networking. Please review the CVE identifiers referenced below for details.

Workaround

There is no known workaround at this time.

Resolution

All mDNSResponder users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/mDNSResponder-212.1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 21, 2009. It is likely that your system is already no longer affected by this issue.

References

[ 1 ] CVE-2007-2386 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386 [ 2 ] CVE-2007-3744 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744 [ 3 ] CVE-2007-3828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828 [ 4 ] CVE-2008-0989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989 [ 5 ] CVE-2008-2326 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326 [ 6 ] CVE-2008-3630 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201201-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

. ----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.

1) Multiple boundary errors in AFP client when processing "afp://" URLs can be exploited to cause stack-based buffer overflows when a user connects to a malicious AFP server.

Successful exploitation may allow execution of arbitrary code.

2) An error exists in AFP Server when checking Kerberos principal realm names. This can be exploited to make unauthorized connections to the server when cross-realm authentication with AFP Server is used.

3) Multiple vulnerabilities in Apache can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.

For more information: SA18008 SA21197 SA26636 SA27906 SA28046

4) A boundary error within the handling of file names in the NSDocument API in AppKit can be exploited to cause a stack-based buffer overflow.

6) Multiple integer overflow errors exist in the parser for a legacy serialization format. This can be exploited to cause a heap-based buffer overflow when a specially crafted serialized property list is parsed.

Successful exploitation may allow execution of arbitrary code.

7) An error in CFNetwork can be exploited to spoof secure websites via 502 Bad Gateway errors from a malicious HTTPS proxy server.

8) Multiple vulnerabilities in ClamAV can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

For more information: SA23347 SA24187 SA24891 SA26038 SA26530 SA28117 SA28907

9) An integer overflow error exists in CoreFoundation when handling time zone data.

10) The problem is that files with names ending in ".ief" can be automatically opened in AppleWorks if "Open 'Safe' files" is enabled in Safari.

13) A boundary error in curl can be exploited to compromise a user's system.

For more information: SA17907

14) A vulnerability in emacs can be exploited by malicious people to compromise a user's system.

For more information: SA27508

15) A vulnerability in "file" can be exploited by malicious people to compromise a vulnerable system.

For more information: SA24548

16) An input validation error exists in the NSSelectorFromString API, which can potentially be exploited to execute arbitrary code via a malformed selector name.

17) A race condition error in NSFileManager can potentially be exploited to gain escalated privileges.

18) A boundary error in NSFileManager can potentially be exploited to cause a stack-based buffer overflow via an overly long pathname with a specially crafted structure.

19) A race condition error exists in the cache management of NSURLConnection. This can be exploited to cause a DoS or execute arbitrary code in applications using the library (e.g. Safari).

20) A race condition error exists in NSXML. This can be exploited to execute arbitrary code by enticing a user to process an XML file in an application which uses NSXML.

21) An error in Help Viewer can be exploited to insert arbitrary HTML or JavaScript into the generated topic list page via a specially crafted "help:topic_list" URL and may redirect to a Help Viewer "help:runscript" link that runs Applescript.

22) A boundary error exists in Image Raw within the handling of Adobe Digital Negative (DNG) image files. This can be exploited to cause a stack-based buffer overflow by enticing a user to open a maliciously crafted image file.

23) Multiple vulnerabilities in Kerberos can be exploited to cause a DoS or to compromise a vulnerable system.

For more information: SA29428

24) An off-by-one error the "strnstr()" in libc can be exploited to cause a DoS.

26) An error in notifyd can be exploited by a malicious, local user to deny access to notifications by sending fake Mach port death notifications to notifyd.

27) An array indexing error in the pax command line tool can be exploited to execute arbitrary code.

28) Multiple vulnerabilities in php can be exploited to bypass certain security restrictions.

For more information: SA27648 SA28318

29) A security issue is caused due to the Podcast Capture application providing passwords to a subtask through the arguments.

30) Printing and Preview handle PDF files with weak encryption.

31) An error in Printing in the handling of authenticated print queues can lead to credentials being saved to disk.

33) A null-pointer dereference error exists in the handling of Universal Disc Format (UDF) file systems, which can be exploited to cause a system shutdown by enticing a user to open a maliciously crafted disk image.

35) Some vulnerabilities in X11 can be exploited by malicious, local users to gain escalated privileges.

For more information: SA27040 SA28532

36) Some vulnerabilities in libpng can be exploited by malicious people to cause a DoS (Denial of Service).

For more information: SA22900 SA25292 SA27093 SA27130

SOLUTION: Apply Security Update 2008-002.

Security Update 2008-002 v1.0 (PPC): http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html

Security Update 2008-002 v1.0 (Universal): http://www.apple.com/support/downloads/securityupdate2008002v10universal.html

Security Update 2008-002 v1.0 (Leopard): http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html

Security Update 2008-002 v1.0 Server (Leopard): http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html

Security Update 2008-002 v1.0 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html

Security Update 2008-002 v1.0 Server (Universal): http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html

PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm 11) regenrecht via iDefense 19) Daniel Jalkut, Red Sweater Software 22) Brian Mastenbrook 24) Mike Ash, Rogue Amoeba Software 29) Maximilian Reiss, Chair for Applied Software Engineering, TUM 33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega

34) Rodrigo Carvalho CORE Security Technologies

ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307562

CORE-2008-0123: http://www.coresecurity.com/?action=item&id=2189

OTHER REFERENCES: SA17907: http://secunia.com/advisories/17907/

SA18008: http://secunia.com/advisories/18008/

SA21187: http://secunia.com/advisories/21197/

SA22900: http://secunia.com/advisories/22900/

SA23347: http://secunia.com/advisories/23347/

SA24187: http://secunia.com/advisories/24187/

SA24548: http://secunia.com/advisories/24548/

SA24891: http://secunia.com/advisories/24891/

SA25292: http://secunia.com/advisories/25292/

SA26038: http://secunia.com/advisories/26038/

SA26530: http://secunia.com/advisories/26530/

SA26636: http://secunia.com/advisories/26636/

SA27040: http://secunia.com/advisories/27040/

SA27093: http://secunia.com/advisories/27093/

SA27130: http://secunia.com/advisories/27130/

SA27648: http://secunia.com/advisories/27648/

SA27508: http://secunia.com/advisories/27508/

SA27906: http://secunia.com/advisories/27906/

SA28046: http://secunia.com/advisories/28046/

SA28117: http://secunia.com/advisories/28117/

SAS28318: http://secunia.com/advisories/28318/

SA28532: http://secunia.com/advisories/28532/

SA28907: http://secunia.com/advisories/28907/

SA29428: http://secunia.com/advisories/29428/

SA29431: http://secunia.com/advisories/29431/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200803-0232",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "directory pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cosmicperl",
        "version": "10.0.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.03"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "28339"
      },
      {
        "db": "BID",
        "id": "28304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ragnar SundbladregenrechtDaniel JalkutBrian MastenbrookClint RuohoMike Ash",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-0989",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2008-0989",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "VHN-31114",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-0989",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-0989",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200803-288",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-31114",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31114"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Format string vulnerability in mDNSResponderHelper in Apple Mac OS X 10.5.2 allows local users to execute arbitrary code via format string specifiers in the local hostname. This occurs because \u0027mDNSResponderHelper\u0027 fails to adequately sanitize user-supplied input before passing it to a formatted-printing function. Failed exploit attempts will likely result in a denial of service. Apple Mac OS X is prone to multiple security vulnerabilities. \nThese issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server. \nAttackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. \nThese issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier. \nNOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:\n28320 Apple Mac OS X AFP Client \u0027afp://\u0027 URI Remote Code  Execution Vulnerability CVE-2008-0044. \n28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994\n28388 Apple Mac OS X AppKit NSDocument API\u0027s Stack Based Buffer Overflow Vulnerability CVE-2008-0048\n28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049\n28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057\n28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997\n28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046\n28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051\n28384 Apple Mac OS X CoreServices \u0027.ief\u0027 Files Security Policy Violation Weakness CVE-2008-0052\n28334 CUPS Multiple Unspecified Input Validation Vulnerabilities\n28341 Apple Mac OS X Foundation \u0027NSSelectorFromString\u0027 Input Validation Vulnerability\n28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability\n28357 Apple Mac OS X Foundation \u0027NSFileManager\u0027 Stack-Based Buffer Overflow Vulnerability\n28359 Apple Mac OS X Foundation \u0027NSURLConnection\u0027 Cache Management Race Condition Security Vulnerability\n28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability\n28367 Apple Mac OS X Foundation \u0027NSXML\u0027 XML File Processing Race Condition Security Vulnerability\n28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability\n28374 Apple Mac OS X libc \u0027strnstr(3)\u0027 Off-By-One Denial of Service Vulnerability\n28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness\n28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness\n28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability\n28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability\n28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability\n28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability\n28345 Apple Mac OS X \u0027notifyd\u0027 Local Denial of Service Vulnerability\n28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability\n28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. There is a format string vulnerability in mDNSResponderHelper. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201201-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: mDNSResponder: Multiple vulnerabilities\n     Date: January 20, 2012\n     Bugs: #290822\n       ID: 201201-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in mDNSResponder, which could\nlead to execution of arbitrary code with root privileges. \n\nBackground\n==========\n\nmDNSResponder is a component of Apple\u0027s Bonjour, an initiative for\nzero-configuration networking. Please\nreview the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll mDNSResponder users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=net-misc/mDNSResponder-212.1\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since November 21, 2009. It is likely that your system is\nalready no longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2007-2386\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386\n[ 2 ] CVE-2007-3744\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744\n[ 3 ] CVE-2007-3828\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828\n[ 4 ] CVE-2008-0989\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989\n[ 5 ] CVE-2008-2326\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326\n[ 6 ] CVE-2008-3630\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201201-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. ----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\n1) Multiple boundary errors in AFP client when processing \"afp://\"\nURLs can be exploited to cause stack-based buffer overflows when a\nuser connects to a malicious AFP server. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error exists in AFP Server when checking Kerberos principal\nrealm names. This can be exploited to make unauthorized connections\nto the server when cross-realm authentication with AFP Server is\nused. \n\n3) Multiple vulnerabilities in Apache can be exploited by malicious\npeople to conduct cross-site scripting attacks, cause a DoS (Denial\nof Service), or potentially compromise a vulnerable system. \n\nFor more information:\nSA18008\nSA21197\nSA26636\nSA27906\nSA28046\n\n4) A boundary error within the handling of file names in the\nNSDocument API in AppKit can be exploited to cause a stack-based\nbuffer overflow. \n\n6) Multiple integer overflow errors exist in the parser for a legacy\nserialization format. This can be exploited to cause a heap-based\nbuffer overflow when a specially crafted serialized property list is\nparsed. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n7) An error in CFNetwork can be exploited to spoof secure websites\nvia 502 Bad Gateway errors from a malicious HTTPS proxy server. \n\n8) Multiple vulnerabilities in ClamAV can be exploited by malicious\npeople to cause a DoS (Denial of Service) or to compromise a\nvulnerable system. \n\nFor more information:\nSA23347\nSA24187\nSA24891\nSA26038\nSA26530\nSA28117\nSA28907\n\n9) An integer overflow error exists in CoreFoundation when handling\ntime zone data. \n\n10) The problem is that files with names ending in \".ief\" can be\nautomatically opened in AppleWorks if \"Open \u0027Safe\u0027 files\" is enabled\nin Safari. \n\n13) A boundary error in curl can be exploited to compromise a user\u0027s\nsystem. \n\nFor more information:\nSA17907\n\n14) A vulnerability in emacs can be exploited by malicious people to\ncompromise a user\u0027s system. \n\nFor more information:\nSA27508\n\n15) A vulnerability in \"file\" can be exploited by malicious people to\ncompromise a vulnerable system. \n\nFor more information:\nSA24548\n\n16) An input validation error exists in the NSSelectorFromString API,\nwhich can potentially be exploited to execute arbitrary code via a\nmalformed selector name. \n\n17) A race condition error in NSFileManager can potentially be\nexploited to gain escalated privileges. \n\n18) A boundary error in NSFileManager can potentially be exploited to\ncause a stack-based buffer overflow via an overly long pathname with a\nspecially crafted structure. \n\n19) A race condition error exists in the cache management of\nNSURLConnection. This can be exploited to cause a DoS or execute\narbitrary code in applications using the library (e.g. Safari). \n\n20) A race condition error exists in NSXML. This can be exploited to\nexecute arbitrary code by enticing a user to process an XML file in\nan application which uses NSXML. \n\n21) An error in Help Viewer can be exploited to insert arbitrary HTML\nor JavaScript into the generated topic list page via a specially\ncrafted \"help:topic_list\" URL and may redirect to a Help Viewer\n\"help:runscript\" link that runs Applescript. \n\n22) A boundary error exists in Image Raw within the handling of Adobe\nDigital Negative (DNG) image files. This can be exploited to cause a\nstack-based buffer overflow by enticing a user to open a maliciously\ncrafted image file. \n\n23) Multiple vulnerabilities in Kerberos can be exploited to cause a\nDoS or to  compromise a vulnerable system. \n\nFor more information:\nSA29428\n\n24) An off-by-one error the \"strnstr()\" in libc can be exploited to\ncause a DoS. \n\n26) An error in notifyd can be exploited by a malicious, local user\nto deny access to notifications by sending fake Mach port death\nnotifications to notifyd. \n\n27) An array indexing error in the pax command line tool can be\nexploited to execute arbitrary code. \n\n28) Multiple vulnerabilities in php can be exploited to bypass\ncertain security restrictions. \n\nFor more information:\nSA27648\nSA28318\n\n29) A security issue is caused due to the Podcast Capture application\nproviding passwords to a subtask through the arguments. \n\n30) Printing and Preview handle PDF files with weak encryption. \n\n31) An error in Printing in the handling of authenticated print\nqueues can lead to credentials being saved to disk. \n\n33) A null-pointer dereference error exists in the handling of\nUniversal Disc Format (UDF) file systems, which can be exploited to\ncause a system shutdown by enticing a user to open a maliciously\ncrafted disk image. \n\n35) Some vulnerabilities in X11 can be exploited by malicious, local\nusers to gain escalated privileges. \n\nFor more information:\nSA27040\nSA28532\n\n36) Some vulnerabilities in libpng can be exploited by malicious\npeople to cause a DoS (Denial of Service). \n\nFor more information:\nSA22900\nSA25292\nSA27093\nSA27130\n\nSOLUTION:\nApply Security Update 2008-002. \n\nSecurity Update 2008-002 v1.0 (PPC):\nhttp://www.apple.com/support/downloads/securityupdate2008002v10ppc.html\n\nSecurity Update 2008-002 v1.0 (Universal):\nhttp://www.apple.com/support/downloads/securityupdate2008002v10universal.html\n\nSecurity Update 2008-002 v1.0 (Leopard):\nhttp://www.apple.com/support/downloads/securityupdate2008002v10leopard.html\n\nSecurity Update 2008-002 v1.0 Server (Leopard):\nhttp://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html\n\nSecurity Update 2008-002 v1.0 Server (PPC):\nhttp://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html\n\nSecurity Update 2008-002 v1.0 Server (Universal):\nhttp://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n1) Ragnar Sundblad of KTH - Royal Institute of Technology, Stockholm\n11) regenrecht via iDefense\n19) Daniel Jalkut, Red Sweater Software\n22) Brian Mastenbrook\n24) Mike Ash, Rogue Amoeba Software\n29) Maximilian Reiss, Chair for Applied Software Engineering, TUM\n33) Paul Wagland of Redwood Software, and Wayne Linder of Iomega\n\n34) Rodrigo Carvalho CORE Security Technologies\n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=307562\n\nCORE-2008-0123:\nhttp://www.coresecurity.com/?action=item\u0026id=2189\n\nOTHER REFERENCES:\nSA17907:\nhttp://secunia.com/advisories/17907/\n\nSA18008:\nhttp://secunia.com/advisories/18008/\n\nSA21187:\nhttp://secunia.com/advisories/21197/\n\nSA22900:\nhttp://secunia.com/advisories/22900/\n\nSA23347:\nhttp://secunia.com/advisories/23347/\n\nSA24187:\nhttp://secunia.com/advisories/24187/\n\nSA24548:\nhttp://secunia.com/advisories/24548/\n\nSA24891:\nhttp://secunia.com/advisories/24891/\n\nSA25292:\nhttp://secunia.com/advisories/25292/\n\nSA26038:\nhttp://secunia.com/advisories/26038/\n\nSA26530:\nhttp://secunia.com/advisories/26530/\n\nSA26636:\nhttp://secunia.com/advisories/26636/\n\nSA27040:\nhttp://secunia.com/advisories/27040/\n\nSA27093:\nhttp://secunia.com/advisories/27093/\n\nSA27130:\nhttp://secunia.com/advisories/27130/\n\nSA27648:\nhttp://secunia.com/advisories/27648/\n\nSA27508:\nhttp://secunia.com/advisories/27508/\n\nSA27906:\nhttp://secunia.com/advisories/27906/\n\nSA28046:\nhttp://secunia.com/advisories/28046/\n\nSA28117:\nhttp://secunia.com/advisories/28117/\n\nSAS28318:\nhttp://secunia.com/advisories/28318/\n\nSA28532:\nhttp://secunia.com/advisories/28532/\n\nSA28907:\nhttp://secunia.com/advisories/28907/\n\nSA29428:\nhttp://secunia.com/advisories/29428/\n\nSA29431:\nhttp://secunia.com/advisories/29431/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-0989"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "db": "BID",
        "id": "28339"
      },
      {
        "db": "BID",
        "id": "28304"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31114"
      },
      {
        "db": "PACKETSTORM",
        "id": "108968"
      },
      {
        "db": "PACKETSTORM",
        "id": "64747"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-0989",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "28339",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "28304",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "29420",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1019662",
        "trust": 2.5
      },
      {
        "db": "USCERT",
        "id": "TA08-079A",
        "trust": 2.5
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-0924",
        "trust": 1.7
      },
      {
        "db": "USCERT",
        "id": "SA08-079A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288",
        "trust": 0.7
      },
      {
        "db": "CERT/CC",
        "id": "TA08-079A",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2008-03-18",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "41292",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-31114",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "108968",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "64747",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31114"
      },
      {
        "db": "BID",
        "id": "28339"
      },
      {
        "db": "BID",
        "id": "28304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "db": "PACKETSTORM",
        "id": "108968"
      },
      {
        "db": "PACKETSTORM",
        "id": "64747"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "id": "VAR-200803-0232",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31114"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:32:29.875000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security Update 2008-002",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT1249?viewlocale=en_US"
      },
      {
        "title": "Security Update 2008-002",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT1249?viewlocale=ja_JP"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-134",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/28304"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/28339"
      },
      {
        "trust": 2.5,
        "url": "http://www.us-cert.gov/cas/techalerts/ta08-079a.html"
      },
      {
        "trust": 2.5,
        "url": "http://www.securitytracker.com/id?1019662"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/29420"
      },
      {
        "trust": 1.8,
        "url": "http://docs.info.apple.com/article.html?artnum=307562"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2008/mar/msg00001.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2008/0924/references"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41292"
      },
      {
        "trust": 0.9,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0989"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0989"
      },
      {
        "trust": 0.8,
        "url": "http://www.frsirt.com/english/advisories/2008/0924"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta08-079a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta08-079a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa08-079a.html"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/41292"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/0924/references"
      },
      {
        "trust": 0.3,
        "url": "http://software.cisco.com/download/navigator.html?mdfid=283613663"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.3,
        "url": "http://docs.info.apple.com/article.html?artnum=307430"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0989"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3630"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3828"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-2326"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2386"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3828"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3744"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-201201-05.xml"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2326"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2386"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3744"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3630"
      },
      {
        "trust": 0.1,
        "url": "http://www.coresecurity.com/?action=item\u0026id=2189"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28046/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27648/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008002v10serveruniversal.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008002v10ppc.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24891/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27093/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/29431/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27906/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008002v10universal.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/22900/"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/?page=changelog"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/21197/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/23347/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/29420/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008002v10leopard.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26038/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008002v10serverppc.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27130/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28532/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/29428/"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24187/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24548/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26636/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25292/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/18008/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27040/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27508/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28117/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28907/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008002v10serverleopard.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/17907/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26530/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28318/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31114"
      },
      {
        "db": "BID",
        "id": "28339"
      },
      {
        "db": "BID",
        "id": "28304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "db": "PACKETSTORM",
        "id": "108968"
      },
      {
        "db": "PACKETSTORM",
        "id": "64747"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-31114"
      },
      {
        "db": "BID",
        "id": "28339"
      },
      {
        "db": "BID",
        "id": "28304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "db": "PACKETSTORM",
        "id": "108968"
      },
      {
        "db": "PACKETSTORM",
        "id": "64747"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-03-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31114"
      },
      {
        "date": "2008-03-18T00:00:00",
        "db": "BID",
        "id": "28339"
      },
      {
        "date": "2008-03-18T00:00:00",
        "db": "BID",
        "id": "28304"
      },
      {
        "date": "2008-04-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "date": "2012-01-23T16:17:51",
        "db": "PACKETSTORM",
        "id": "108968"
      },
      {
        "date": "2008-03-20T20:39:31",
        "db": "PACKETSTORM",
        "id": "64747"
      },
      {
        "date": "2008-03-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      },
      {
        "date": "2008-03-18T23:44:00",
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31114"
      },
      {
        "date": "2012-01-23T18:50:00",
        "db": "BID",
        "id": "28339"
      },
      {
        "date": "2008-03-22T01:10:00",
        "db": "BID",
        "id": "28304"
      },
      {
        "date": "2008-04-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      },
      {
        "date": "2008-10-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      },
      {
        "date": "2024-11-21T00:43:23.210000",
        "db": "NVD",
        "id": "CVE-2008-0989"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "28339"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS X Format string vulnerability in host name handling",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001209"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "format string",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200803-288"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…