var-200805-0586
Vulnerability from variot

Apple Filing Protocol (AFP) Server in Apple Mac OS X before 10.5.3 does not verify that requested files and directories are inside shared folders, which allows remote attackers to read arbitrary files via unspecified AFP traffic. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-003 and Mac OS X/Mac OS X Server 10.5.3. The security update addresses a total of 19 new vulnerabilities that affect the AFP Server, AppKit, Apple Pixlet Video, ATS, CFNetwork, CoreFoundation, CoreGraphics, CoreTypes, CUPS, Help Viewer, iCal, International Components for Unicode, Image Capture, ImageIO, Kernel, Mail, Single Sign-On, and Wiki Server components of Mac OS X. NOTE: This BID is being retired; the following individual records have been created to better document the issues: 29480 Apple Mac OS X CoreGraphics PDF Handling Code Execution Vulnerability 29481 Apple Mac OS X CoreTypes Unsafe Content Warning Weakness 29483 Apple Mac OS X Help Viewer 'help:topic' URI Buffer Overflow Vulnerability 29484 Apple Mac OS X CUPS Debug Logging Information Disclosure Vulnerability 29486 Apple Mac OS X iCal '.ics' File Handling Remote Code Execution Vulnerability 29487 Apple Mac OS X AppKit Malformed File Remote Code Execution Vulnerability 29488 Apple Mac OS X International Components for Unicode Information Disclosure Vulnerability 29489 Apple Mac OS X Pixlet Video Multiple Unspecified Memory Corruption Vulnerabilities 29490 Apple Mac OS X AFP Server File Sharing Unauthorized File Access Vulnerability 29491 Apple Mac OS X CoreFoundation CFData Object Handling Code Execution Vulnerability 29492 Apple Mac OS X Apple Type Services PDF Handling Code Execution Vulnerability 29493 Apple Mac OS X CFNetwork SSL Client Certificate Handling Information Disclosure Vulnerability 29500 Apple Mac OS X Mail Memory Corruption Vulnerability 29501 Apple Mac OS X Image Capture Webserver Directory Traversal Vulnerability 29511 Apple Mac OS X Wiki Server User Name Enumeration Weakness 29513 Apple Mac OS X ImageIO BMP/GIF Image Information Disclosure Vulnerability 29514 Apple Mac OS X ImageIO JPEG2000 Handling Remote Code Execution Vulnerability 29520 Apple Mac OS X Single Sign-On 'sso_util' Local Information Disclosure Vulnerability 29521 Apple Mac OS X Image Capture Local Arbitrary File Overwrite Vulnerability. Successfully exploiting this issue will allow attackers to obtain potentially sensitive information that may lead to other attacks.

I. Further details are available in the US-CERT Vulnerability Notes Database.

II.

III. These and other updates are available via Software Update or via Apple Downloads.

IV. Please send email to cert@cert.org with "TA08-150A Feedback VU#566875" in the subject.


For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.


Produced 2008 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>

Revision History

May 29 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBSD8M8XIHljM+H4irAQL8gggAhPXOm6pPXxrZpjiJYHmlhwCCIclyj9vo Yvs/cicI8vJ3vB4xkUd51/iFoze6D3mFnSxwVAgrixysdkaCxBUyWqmRumEDTXfx 403FR2yIFpSFr7+9VXXWpmq6E0aHVjrKPOArq5uysuIPOHiEbKUisT2gBXUlPrtN RjUg/w/9/IEryPxv/nVzHMcLDde2OLyoo+tiSCOqJK/sC/VUM/d1zkdIDOfu0zom vmqM10hDyA7VR2rgkKvSbqXOWHua0t4eHaNMP0h3N51yLmFhMHxBGj9zWXj9dpHI DcQ9gnQKm7YocOfLC4IPV0BWuPoAkNOEAPeRapPgmJ60icjOpn/MTQ== =QvSr -----END PGP SIGNATURE----- . ----------------------------------------------------------------------

Secunia Network Software Inspector 2.0 (NSI) - Public Beta

The Public Beta has ended. Thanks to all that participated.

2) Some vulnerabilities in Apache can be exploited by malicious people to conduct cross-site scripting attacks or to cause a DoS (Denial of Service).

3) An unspecified error in AppKit can potentially be exploited to execute arbitrary code when a user opens a specially crafted document file with an editor that uses AppKit (e.g. TextEdit).

4) Multiple unspecified errors exist in the processing of Pixlet video files. These can be exploited to cause memory corruption and potentially allow for execution of arbitrary code when a user opens a specially crafted movie file.

5) An unspecified error exists in Apple Type Services when processing embedded fonts in PDF files. This can be exploited to cause a memory corruption when a PDF file containing a specially crafted embedded font is printed.

Successful exploitation may allow execution of arbitrary code.

6) An error in Safari's SSL client certificate handling can lead to an information disclosure of the first client certificate found in the keychain when a web server issues a client certificate request.

7) An integer overflow exists in CoreFoundation when handling CFData objects. This can be exploited to cause a heap-based buffer overflow if an application calls "CFDataReplaceBytes" with an invalid "length" argument.

8) An error due to an uninitialised variable in CoreGraphics can potentially be exploited to execute arbitrary code when a specially crafted PDF is opened.

9) A weakness is caused due to users not being warned before opening certain potentially unsafe content types.

10) An error when printing to password-protected printers with debug logging enabled may lead to the disclosure of sensitive information.

11) Some vulnerabilities in Adobe Flash Player can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or to potentially compromise a user's system.

For more information: SA28083

12) An integer underflow error in Help Viewer when handling help:topic URLs can be exploited to cause a buffer overflow when a specially crafted help:topic URL is accessed.

Successful exploitation may allow execution of arbitrary code.

13) A conversion error exists in ICU when handling certain character encodings.

14) Input passed to unspecified parameters in Image Capture's embedded web server is not properly sanitised before being used. This can be exploited to disclose the content of local files via directory traversal attacks.

15) An error in the handling of temporary files in Image Capture can be exploited by malicious, local users to manipulate files with the privilege of a user running Image Capture.

16) A boundary error in the BMP and GIF image decoding engine in ImageIO can be exploited to disclose content in memory.

17) Some vulnerabilities in ImageIO can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerabilities are caused due to the use of vulnerable libpng code.

For more information: SA27093 SA27130

18) An integer overflow error in ImageIO within the processing of JPEG2000 images can be exploited to cause a heap-based buffer overflow when a specially crafted JPEG2000 image is viewed.

Successful exploitation of this vulnerability may allow execution of arbitrary code.

19) An error in Mail is caused due to an uninitialised variable and can lead to disclosure of sensitive information and potentially execution of arbitrary code when mail is sent through an SMTP server over IPv6.

20) A vulnerability in Mongrel can be exploited by malicious people to disclose sensitive information.

For more information: SA28323

21) The sso_util command-line tool requires that passwords be passed to it in its arguments, which can be exploited by malicious, local users to disclose the passwords.

22) An error in Wiki Server can be exploited to determine valid local user names when nonexistent blogs are accessed.

ORIGINAL ADVISORY: http://support.apple.com/kb/HT1897

OTHER REFERENCES: SA18008: http://secunia.com/advisories/18008/

SA18307: http://secunia.com/advisories/18307/

SA26273: http://secunia.com/advisories/26273/

SA26636: http://secunia.com/advisories/26636/

SA27093: http://secunia.com/advisories/27093/

SA27130: http://secunia.com/advisories/27130/

SA28081: http://secunia.com/advisories/28081/

SA28083: http://secunia.com/advisories/28083/

SA28323: http://secunia.com/advisories/28323/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200805-0586",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.11"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.11"
      },
      {
        "model": "mac os x",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.3"
      },
      {
        "model": "mac os x server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.3"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.3"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "29412"
      },
      {
        "db": "BID",
        "id": "29490"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Melissa O\u0027NeillPaul HaddadRodrigo CarvalhoGynvael Coldwind",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-1027",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2008-1027",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-31152",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-1027",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-1027",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200806-001",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-31152",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Filing Protocol (AFP) Server in Apple Mac OS X before 10.5.3 does not verify that requested files and directories are inside shared folders, which allows remote attackers to read arbitrary files via unspecified AFP traffic. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-003 and Mac OS X/Mac OS X Server 10.5.3. \nThe security update addresses a total of 19 new vulnerabilities that affect the AFP Server, AppKit, Apple Pixlet Video, ATS, CFNetwork, CoreFoundation, CoreGraphics, CoreTypes, CUPS, Help Viewer, iCal, International Components for Unicode, Image Capture, ImageIO, Kernel, Mail, Single Sign-On, and Wiki Server components of Mac OS X. \nNOTE: This BID is being retired; the following individual records have been created to better document the issues:\n29480 Apple Mac OS X CoreGraphics PDF Handling Code Execution Vulnerability\n29481 Apple Mac OS X CoreTypes Unsafe Content Warning Weakness\n29483 Apple Mac OS X Help Viewer \u0027help:topic\u0027 URI Buffer Overflow Vulnerability\n29484 Apple Mac OS X CUPS Debug Logging Information Disclosure Vulnerability\n29486 Apple Mac OS X iCal \u0027.ics\u0027 File Handling Remote Code Execution Vulnerability\n29487 Apple Mac OS X AppKit Malformed File Remote Code Execution Vulnerability\n29488 Apple Mac OS X International Components for Unicode Information Disclosure Vulnerability\n29489 Apple Mac OS X Pixlet Video Multiple Unspecified Memory Corruption Vulnerabilities\n29490 Apple Mac OS X AFP Server File Sharing Unauthorized File Access Vulnerability\n29491 Apple Mac OS X CoreFoundation CFData Object Handling Code Execution Vulnerability\n29492 Apple Mac OS X Apple Type Services PDF Handling Code Execution Vulnerability\n29493 Apple Mac OS X CFNetwork SSL Client Certificate Handling Information Disclosure Vulnerability\n29500 Apple Mac OS X Mail Memory Corruption Vulnerability\n29501 Apple Mac OS X Image Capture Webserver Directory Traversal Vulnerability\n29511 Apple Mac OS X Wiki Server User Name Enumeration Weakness\n29513 Apple Mac OS X ImageIO BMP/GIF Image Information Disclosure Vulnerability\n29514 Apple Mac OS X ImageIO JPEG2000 Handling Remote Code Execution Vulnerability\n29520 Apple Mac OS X Single Sign-On \u0027sso_util\u0027 Local Information Disclosure Vulnerability\n29521 Apple Mac OS X Image Capture Local Arbitrary File Overwrite Vulnerability. \nSuccessfully exploiting this issue will allow attackers to obtain potentially sensitive information that may lead to other attacks. \n\nI. Further\n   details are available in the US-CERT Vulnerability Notes Database. \n\nII. \n\nIII.  These  and other updates are available via Software Update or\n   via Apple Downloads. \n\nIV. Please send\n  email to \u003ccert@cert.org\u003e with \"TA08-150A Feedback VU#566875\" in the\n  subject. \n _________________________________________________________________\n\n  For instructions on subscribing to or unsubscribing from this\n  mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n _________________________________________________________________\n\n  Produced 2008 by US-CERT, a government organization. \n\n  Terms of use:\n\n    \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n   Revision History\n\n   May 29 2008: Initial release\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBSD8M8XIHljM+H4irAQL8gggAhPXOm6pPXxrZpjiJYHmlhwCCIclyj9vo\nYvs/cicI8vJ3vB4xkUd51/iFoze6D3mFnSxwVAgrixysdkaCxBUyWqmRumEDTXfx\n403FR2yIFpSFr7+9VXXWpmq6E0aHVjrKPOArq5uysuIPOHiEbKUisT2gBXUlPrtN\nRjUg/w/9/IEryPxv/nVzHMcLDde2OLyoo+tiSCOqJK/sC/VUM/d1zkdIDOfu0zom\nvmqM10hDyA7VR2rgkKvSbqXOWHua0t4eHaNMP0h3N51yLmFhMHxBGj9zWXj9dpHI\nDcQ9gnQKm7YocOfLC4IPV0BWuPoAkNOEAPeRapPgmJ60icjOpn/MTQ==\n=QvSr\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\nSecunia Network Software Inspector 2.0 (NSI) - Public Beta\n\nThe Public Beta has ended. Thanks to all that participated. \n\n2) Some vulnerabilities in Apache can be exploited by malicious\npeople to conduct cross-site scripting attacks or to cause a DoS\n(Denial of Service). \n\n3) An unspecified error in AppKit can potentially be exploited to\nexecute arbitrary code when a user opens a specially crafted document\nfile with an editor that uses AppKit (e.g. TextEdit). \n\n4) Multiple unspecified errors exist in the processing of Pixlet\nvideo files. These can be exploited to cause memory corruption and\npotentially allow for execution of arbitrary code when a user opens a\nspecially crafted movie file. \n\n5) An unspecified error exists in Apple Type Services when processing\nembedded fonts in PDF files. This can be exploited to cause a memory\ncorruption when a PDF file containing a specially crafted embedded\nfont is printed. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n6) An error in Safari\u0027s SSL client certificate handling can lead to\nan information disclosure of the first client certificate found in\nthe keychain when a web server issues a client certificate request. \n\n7) An integer overflow exists in CoreFoundation when handling CFData\nobjects. This can be exploited to cause a heap-based buffer overflow\nif an application calls \"CFDataReplaceBytes\" with an invalid \"length\"\nargument. \n\n8) An error due to an uninitialised variable in CoreGraphics can\npotentially be exploited to execute arbitrary code when a specially\ncrafted PDF is opened. \n\n9) A weakness is caused due to users not being warned before opening\ncertain potentially unsafe content types. \n\n10) An error when printing to password-protected printers with debug\nlogging enabled may lead to the disclosure of sensitive information. \n\n11) Some vulnerabilities in Adobe Flash Player can be exploited by\nmalicious people to bypass certain security restrictions, conduct\ncross-site scripting attacks, or to potentially compromise a user\u0027s\nsystem. \n\nFor more information:\nSA28083\n\n12) An integer underflow error in Help Viewer when handling\nhelp:topic URLs can be exploited to cause a buffer overflow when a \nspecially crafted help:topic URL is accessed. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n13) A conversion error exists in ICU when handling certain character\nencodings. \n\n14) Input passed to unspecified parameters in Image Capture\u0027s\nembedded web server is not properly sanitised before being used. This\ncan be exploited to disclose the content of local files via directory\ntraversal attacks. \n\n15) An error in the handling of temporary files in Image Capture can\nbe exploited by malicious, local users to manipulate files with the\nprivilege of a user running Image Capture. \n\n16) A boundary error in the BMP and GIF image decoding engine in\nImageIO can be exploited to disclose content in memory. \n\n17) Some vulnerabilities in ImageIO can be exploited by malicious\npeople to cause a DoS (Denial of Service). \n\nThe vulnerabilities are caused due to the use of vulnerable libpng\ncode. \n\nFor more information:\nSA27093\nSA27130\n\n18) An integer overflow error in ImageIO within the processing of\nJPEG2000 images can be exploited to cause a heap-based buffer\noverflow when a specially crafted JPEG2000 image is viewed. \n\nSuccessful exploitation of this vulnerability may allow execution of\narbitrary code. \n\n19) An error in Mail is caused due to an uninitialised variable and\ncan lead to disclosure of sensitive information and potentially\nexecution of arbitrary code when mail is sent through an SMTP server\nover IPv6. \n\n20) A vulnerability in Mongrel can be exploited by malicious people\nto disclose sensitive information. \n\nFor more information:\nSA28323\n\n21) The sso_util command-line tool requires that passwords be passed\nto it in its arguments, which can be exploited by malicious, local\nusers to disclose the passwords. \n\n22) An error in Wiki Server can be exploited to determine valid local\nuser names when nonexistent blogs are accessed. \n\nORIGINAL ADVISORY:\nhttp://support.apple.com/kb/HT1897\n\nOTHER REFERENCES:\nSA18008:\nhttp://secunia.com/advisories/18008/\n\nSA18307:\nhttp://secunia.com/advisories/18307/\n\nSA26273:\nhttp://secunia.com/advisories/26273/\n\nSA26636:\nhttp://secunia.com/advisories/26636/\n\nSA27093:\nhttp://secunia.com/advisories/27093/\n\nSA27130:\nhttp://secunia.com/advisories/27130/\n\nSA28081:\nhttp://secunia.com/advisories/28081/\n\nSA28083:\nhttp://secunia.com/advisories/28083/\n\nSA28323:\nhttp://secunia.com/advisories/28323/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-1027"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "db": "BID",
        "id": "29412"
      },
      {
        "db": "BID",
        "id": "29490"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "db": "PACKETSTORM",
        "id": "66818"
      },
      {
        "db": "PACKETSTORM",
        "id": "66804"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "29412",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1027",
        "trust": 2.8
      },
      {
        "db": "USCERT",
        "id": "TA08-150A",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "30430",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1020130",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "29490",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-1697",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "42703",
        "trust": 1.4
      },
      {
        "db": "USCERT",
        "id": "SA08-150A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "TA08-150A",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2008-05-28",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-31152",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "66818",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "66804",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "db": "BID",
        "id": "29412"
      },
      {
        "db": "BID",
        "id": "29490"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "db": "PACKETSTORM",
        "id": "66818"
      },
      {
        "db": "PACKETSTORM",
        "id": "66804"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "id": "VAR-200805-0586",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31152"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:15:00.493000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Mac OS X 10.5.3",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT1897"
      },
      {
        "title": "Mac OS X 10.5.3",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT1897?viewlocale=ja_JP"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/29412"
      },
      {
        "trust": 2.5,
        "url": "http://www.us-cert.gov/cas/techalerts/ta08-150a.html"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1020130"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/30430"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2008//may/msg00001.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/29490"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2008/1697"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/42703"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2008/1697"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42703"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1027"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta08-150a/"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta08-150a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1027"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa08-150a.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/kb/ht1338?viewlocale=en_us\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/kb/ht1897\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=apple_security_update_2008_003\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta08-150a.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26273/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/macosxserver1053update.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/18307/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27093/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/macosxserver1053comboupdate.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008003ppc.html"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/kb/ht1897"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/macosx1053update.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008003serverppc.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008003serveruniversal.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27130/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/30430/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/network_software_inspector_2/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26636/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28083/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2008003intel.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/macosx1053comboupdate.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28081/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/18008/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28323/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "db": "BID",
        "id": "29412"
      },
      {
        "db": "BID",
        "id": "29490"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "db": "PACKETSTORM",
        "id": "66818"
      },
      {
        "db": "PACKETSTORM",
        "id": "66804"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "db": "BID",
        "id": "29412"
      },
      {
        "db": "BID",
        "id": "29490"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "db": "PACKETSTORM",
        "id": "66818"
      },
      {
        "db": "PACKETSTORM",
        "id": "66804"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-06-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "date": "2008-05-28T00:00:00",
        "db": "BID",
        "id": "29412"
      },
      {
        "date": "2008-05-28T00:00:00",
        "db": "BID",
        "id": "29490"
      },
      {
        "date": "2008-06-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "date": "2008-05-29T23:21:11",
        "db": "PACKETSTORM",
        "id": "66818"
      },
      {
        "date": "2008-05-29T23:19:06",
        "db": "PACKETSTORM",
        "id": "66804"
      },
      {
        "date": "2008-05-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      },
      {
        "date": "2008-06-02T21:30:00",
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31152"
      },
      {
        "date": "2008-06-04T00:23:00",
        "db": "BID",
        "id": "29412"
      },
      {
        "date": "2015-05-07T18:19:00",
        "db": "BID",
        "id": "29490"
      },
      {
        "date": "2008-06-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      },
      {
        "date": "2024-11-21T00:43:29.567000",
        "db": "NVD",
        "id": "CVE-2008-1027"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "29412"
      },
      {
        "db": "BID",
        "id": "29490"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS X of  Apple Filing Protocol (AFP) Server Vulnerable to reading arbitrary files",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-001393"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200806-001"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…