var-200807-0648
Vulnerability from variot
Unspecified vulnerability in CoreGraphics in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unknown vectors involving "processing of arguments.". Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-005. The security update addresses a total of six new vulnerabilities that affect the CarbonCore, CoreGraphics, Data Detectors Engine, Disk Utility, OpenLDAP, and QuickLook components of Mac OS X. The advisory also contains security updates for 11 previously reported issues. NOTE: This BID is being retired; the following individual records have been created to better document these issues: 30487 Apple Mac OS X CarbonCore Stack Based Buffer Overflow 30488 Apple Mac OS X CoreGraphics Multiple Memory Corruption Vulnerabilities 30489 Apple Mac OS X CoreGraphics Heap Based Buffer Overflow Vulnerability 30490 Apple Mac OS X Data Detectors Engine Denial Of Service Vulnerability 30492 Apple Mac OS X Disk Utility Privilege Escalation Vulnerability 30493 Apple Mac OS X QuickLook Multiple Memory Corruption Vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the affected application or cause denial-of-service conditions.
1) A vulnerability in BIND can be exploited to poison the DNS cache.
For more information: SA30973
2) A boundary error exists in CarbonCore when handling filenames. This can be exploited to cause a stack-based buffer overflow via overly long filenames.
Successful exploitation of the vulnerability may allow execution of arbitrary code.
3) Multiple errors exist in CoreGraphics when processing received arguments. These can be exploited to trigger a memory corruption by e.g. tricking a user into visiting a specially crafted website.
Successful exploitation of the vulnerability may allow execution of arbitrary code.
4) An integer overflow error exists in CoreGraphics when handling PDF files. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file.
Successful exploitation of the vulnerability may allow execution of arbitrary code.
5) Multiple errors in QuickLook when downloading Microsoft Office files can be exploited to cause a memory corruption.
Successful exploitation of the vulnerability may allow execution of arbitrary code.
6) An error exists in the Data Detectors engine when viewing a specially crafted message. This can be exploited to consume overly large resources and trigger an application using the engine to terminate.
7) The problem is that the "Repair Permissions" tool included in Disk Utility sets the "setuid" bit on "/usr/bin/emacs". This can be exploited to execute arbitrary commands with system privileges.
8) An error in OpenLDAP when parsing ASN.1 BER encoded packets can be exploited to cause a DoS.
For more information: SA30853
9) A boundary error exists in the OpenSSL "SSL_get_shared_ciphers()" function.
For more information see vulnerability #4 in: SA22130
10) Some vulnerabilities in PHP can be exploited malicious users to bypass certain security restrictions, and potentially by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.
For more information: SA30048
11) Two vulnerabilities in rsync can be exploited by malicious users to bypass certain security restrictions.
For more information: SA27863
SOLUTION: Apply Security Update 2008-005.
Security Update 2008-005 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008005serverppc.html
Security Update 2008-005 Server (Intel): http://www.apple.com/support/downloads/securityupdate2008005serverintel.html
Security Update 2008-005 (PPC): http://www.apple.com/support/downloads/securityupdate2008005ppc.html
Security Update 2008-005 (Intel): http://www.apple.com/support/downloads/securityupdate2008005intel.html
Security Update 2008-005 (Leopard): http://www.apple.com/support/downloads/securityupdate2008005leopard.html
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Dan Kaminsky of IOActive 2) Thomas Raffetseder of the International Secure Systems Lab and Sergio 'shadown' Alvarez of n.runs AG. 3) Michal Zalewski, Google 4) Pariente Kobi, reported via iDefense 7) Anton Rang and Brian Timares
ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT2647
OTHER REFERENCES: SA22130: http://secunia.com/advisories/22130/
SA27863: http://secunia.com/advisories/27863/
SA30048: http://secunia.com/advisories/30048/
SA30973: http://secunia.com/advisories/30973/
SA30853: http://secunia.com/advisories/30853/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Hi all,
I am way behind on this, so I wanted to drop a quick note regarding some of my vulnerabilities recently addressed by browser vendors - and provide some possibly interesting PoCs / fuzzers to go with them:
Summary : MSIE same-origin bypass race condition (CVE-2007-3091) Impact : security bypass, possibly more Reported : June 2007 (publicly) PoC URL : http://lcamtuf.coredump.cx/ierace/ Bulletin : http://www.microsoft.com/technet/security/bulletin/MS09-019.mspx Notes : additional credit to David Bloom for developing an improved proof-of-concept exploit
Summary : MSIE memory corruption on page transitions Impact : memory corruption, potential code execution Reported : April 2008 (privately) PoC URL : http://lcamtuf.coredump.cx/stest/ (fuzzers) Bulletin : http://www.microsoft.com/technet/security/Bulletin/MS09-014.mspx Notes : -
Summary : multiple browsers implementation crashes (CVE-2008-2321, ???) Impact : memory corruption, potential code execution Reported : February 2008 (privately) PoC URL : http://lcamtuf.coredump.cx/canvas/ (fuzzer) Bulletin : http://lists.apple.com/archives/security-announce/2009/Jun/msg00002.html Bulletin : http://www.opera.com/support/kb/view/882/ Notes : also some DoS issues in Firefox
Summary : Safari page transition tailgating (CVE-2009-1684) Impact : page spoofing, navigation target disclosure Reported : February 2008 (privately) PoC URL : http://lcamtuf.coredump.cx/sftrap2/ Bulletin : http://lists.apple.com/archives/security-announce/2009/Jun/msg00002.html Notes : -
Cheers, /mz .
1) A vulnerability in CoreGraphics can potentially be exploited to compromise a vulnerable system.
For more information: SA31610
3) An error in the processing of TIFF images can cause a device reset.
4) An unspecified error can result in the encryption level for PPTP VPN connections to be lower than expected.
5) A signedness error in the Office Viewer component can potentially be exploited to execute arbitrary code via a specially crafted Microsoft Excel file.
This is related to vulnerability #10 in: SA32222
6) A weakness exists in the handling of emergency calls, which can be exploited to bypass the Passcode lock and call arbitrary numbers when physical access to the device is provided.
7) A weakness causes the Passcode lock not to be restored properly.
8) A security issue can result in the content of an SMS message being displayed when the message arrives while the emergency call screen is shown.
9) An error in Safari when handling HTML table elements can be exploited to cause a memory corruption and potentially execute arbitrary code when a user visits a specially crafted web site.
10) An error in Safari when handling embedded iframe elements can be exploited to spoof the user interface via content being displayed outside its boundaries.
11) An error exists in Safari when launching an application while a call approval dialog is shown. It is also possible to block the user's ability to cancel the call.
12) An error in Webkit can be exploited to disclose potentially sensitive data from form fields, although the "Autocomplete" feature is disabled.
This is related to vulnerability #8 in: SA32706
SOLUTION: Update to iPhone OS 2.2 or iPhone OS for iPod touch 2.2 (downloadable and installable via iTunes). ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
Other vulnerabilities have also been reported of which some may also affect Safari version 3.x.
SOLUTION: Upgrade to Safari version 4, which fixes the vulnerabilities.
PROVIDED AND/OR DISCOVERED BY: 1-3) Tavis Ormandy 4) Chris Evans of Google Inc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200807-0648", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "coregraphics", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.4" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.4" }, { "model": "iphone", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "1.0 to 2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "1.1 to 2.1" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "4.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.4.11" }, { "model": "mac os x server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.4.11" }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.5.4" }, { "model": "mac os x server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.5.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.1" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.4" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.3" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.2" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "safari beta for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.4" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.3" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.4" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1" }, { "model": "safari for windows", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ipod touch", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "iphone", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "2.2" } ], "sources": [ { "db": "BID", "id": "30483" }, { "db": "BID", "id": "30488" }, { "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "db": "CNNVD", "id": "CNNVD-200808-025" }, { "db": "NVD", "id": "CVE-2008-2321" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:iphone", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipod_touch", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001598" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michal Zalewski\u203b lcamtuf@echelon.pl", "sources": [ { "db": "CNNVD", "id": "CNNVD-200808-025" } ], "trust": 0.6 }, "cve": "CVE-2008-2321", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2008-2321", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-32446", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-2321", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-2321", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200808-025", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-32446", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-32446" }, { "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "db": "CNNVD", "id": "CNNVD-200808-025" }, { "db": "NVD", "id": "CVE-2008-2321" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in CoreGraphics in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unknown vectors involving \"processing of arguments.\". Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-005. \nThe security update addresses a total of six new vulnerabilities that affect the CarbonCore, CoreGraphics, Data Detectors Engine, Disk Utility, OpenLDAP, and QuickLook components of Mac OS X. The advisory also contains security updates for 11 previously reported issues. \nNOTE: This BID is being retired; the following individual records have been created to better document these issues:\n30487 Apple Mac OS X CarbonCore Stack Based Buffer Overflow\n30488 Apple Mac OS X CoreGraphics Multiple Memory Corruption Vulnerabilities\n30489 Apple Mac OS X CoreGraphics Heap Based Buffer Overflow Vulnerability\n30490 Apple Mac OS X Data Detectors Engine Denial Of Service Vulnerability\n30492 Apple Mac OS X Disk Utility Privilege Escalation Vulnerability\n30493 Apple Mac OS X QuickLook Multiple Memory Corruption Vulnerabilities. \nAttackers can exploit these issues to execute arbitrary code in the context of the affected application or cause denial-of-service conditions. \n\n1) A vulnerability in BIND can be exploited to poison the DNS cache. \n\nFor more information:\nSA30973\n\n2) A boundary error exists in CarbonCore when handling filenames. \nThis can be exploited to cause a stack-based buffer overflow via\noverly long filenames. \n\nSuccessful exploitation of the vulnerability may allow execution of\narbitrary code. \n\n3) Multiple errors exist in CoreGraphics when processing received\narguments. These can be exploited to trigger a memory corruption by\ne.g. tricking a user into visiting a specially crafted website. \n\nSuccessful exploitation of the vulnerability may allow execution of\narbitrary code. \n\n4) An integer overflow error exists in CoreGraphics when handling PDF\nfiles. This can be exploited to cause a heap-based buffer overflow via\na specially crafted PDF file. \n\nSuccessful exploitation of the vulnerability may allow execution of\narbitrary code. \n\n5) Multiple errors in QuickLook when downloading Microsoft Office\nfiles can be exploited to cause a memory corruption. \n\nSuccessful exploitation of the vulnerability may allow execution of\narbitrary code. \n\n6) An error exists in the Data Detectors engine when viewing a\nspecially crafted message. This can be exploited to consume overly\nlarge resources and trigger an application using the engine to\nterminate. \n\n7) The problem is that the \"Repair Permissions\" tool included in Disk\nUtility sets the \"setuid\" bit on \"/usr/bin/emacs\". This can be\nexploited to execute arbitrary commands with system privileges. \n\n8) An error in OpenLDAP when parsing ASN.1 BER encoded packets can be\nexploited to cause a DoS. \n\nFor more information:\nSA30853\n\n9) A boundary error exists in the OpenSSL \"SSL_get_shared_ciphers()\"\nfunction. \n\nFor more information see vulnerability #4 in:\nSA22130\n\n10) Some vulnerabilities in PHP can be exploited malicious users to\nbypass certain security restrictions, and potentially by malicious\npeople to cause a DoS (Denial of Service) or to compromise a\nvulnerable system. \n\nFor more information:\nSA30048\n\n11) Two vulnerabilities in rsync can be exploited by malicious users\nto bypass certain security restrictions. \n\nFor more information:\nSA27863\n\nSOLUTION:\nApply Security Update 2008-005. \n\nSecurity Update 2008-005 Server (PPC):\nhttp://www.apple.com/support/downloads/securityupdate2008005serverppc.html\n\nSecurity Update 2008-005 Server (Intel):\nhttp://www.apple.com/support/downloads/securityupdate2008005serverintel.html\n\nSecurity Update 2008-005 (PPC):\nhttp://www.apple.com/support/downloads/securityupdate2008005ppc.html\n\nSecurity Update 2008-005 (Intel):\nhttp://www.apple.com/support/downloads/securityupdate2008005intel.html\n\nSecurity Update 2008-005 (Leopard):\nhttp://www.apple.com/support/downloads/securityupdate2008005leopard.html\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n1) Dan Kaminsky of IOActive\n2) Thomas Raffetseder of the International Secure Systems Lab and\nSergio \u0027shadown\u0027 Alvarez of n.runs AG. \n3) Michal Zalewski, Google\n4) Pariente Kobi, reported via iDefense\n7) Anton Rang and Brian Timares\n\nORIGINAL ADVISORY:\nApple:\nhttp://support.apple.com/kb/HT2647\n\nOTHER REFERENCES:\nSA22130:\nhttp://secunia.com/advisories/22130/\n\nSA27863:\nhttp://secunia.com/advisories/27863/\n\nSA30048:\nhttp://secunia.com/advisories/30048/\n\nSA30973:\nhttp://secunia.com/advisories/30973/\n\nSA30853:\nhttp://secunia.com/advisories/30853/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Hi all,\n\nI am way behind on this, so I wanted to drop a quick note regarding\nsome of my vulnerabilities recently addressed by browser vendors - and\nprovide some possibly interesting PoCs / fuzzers to go with them:\n\nSummary : MSIE same-origin bypass race condition (CVE-2007-3091)\nImpact : security bypass, possibly more\nReported : June 2007 (publicly)\nPoC URL : http://lcamtuf.coredump.cx/ierace/\nBulletin : http://www.microsoft.com/technet/security/bulletin/MS09-019.mspx\nNotes : additional credit to David Bloom for developing an improved\nproof-of-concept exploit\n\nSummary : MSIE memory corruption on page transitions\nImpact : memory corruption, potential code execution\nReported : April 2008 (privately)\nPoC URL : http://lcamtuf.coredump.cx/stest/ (fuzzers)\nBulletin : http://www.microsoft.com/technet/security/Bulletin/MS09-014.mspx\nNotes : -\n\nSummary : multiple browsers \u003cCANVAS\u003e implementation crashes\n(CVE-2008-2321, ???)\nImpact : memory corruption, potential code execution\nReported : February 2008 (privately)\nPoC URL : http://lcamtuf.coredump.cx/canvas/ (fuzzer)\nBulletin : http://lists.apple.com/archives/security-announce/2009/Jun/msg00002.html\nBulletin : http://www.opera.com/support/kb/view/882/\nNotes : also some DoS issues in Firefox\n\nSummary : Safari page transition tailgating (CVE-2009-1684)\nImpact : page spoofing, navigation target disclosure\nReported : February 2008 (privately)\nPoC URL : http://lcamtuf.coredump.cx/sftrap2/\nBulletin : http://lists.apple.com/archives/security-announce/2009/Jun/msg00002.html\nNotes : -\n\nCheers,\n/mz\n. \n\n1) A vulnerability in CoreGraphics can potentially be exploited to\ncompromise a vulnerable system. \n\nFor more information:\nSA31610\n\n3) An error in the processing of TIFF images can cause a device\nreset. \n\n4) An unspecified error can result in the encryption level for PPTP\nVPN connections to be lower than expected. \n\n5) A signedness error in the Office Viewer component can potentially\nbe exploited to execute arbitrary code via a specially crafted\nMicrosoft Excel file. \n\nThis is related to vulnerability #10 in:\nSA32222\n\n6) A weakness exists in the handling of emergency calls, which can be\nexploited to bypass the Passcode lock and call arbitrary numbers when\nphysical access to the device is provided. \n\n7) A weakness causes the Passcode lock not to be restored properly. \n\n8) A security issue can result in the content of an SMS message being\ndisplayed when the message arrives while the emergency call screen is\nshown. \n\n9) An error in Safari when handling HTML table elements can be\nexploited to cause a memory corruption and potentially execute\narbitrary code when a user visits a specially crafted web site. \n\n10) An error in Safari when handling embedded iframe elements can be\nexploited to spoof the user interface via content being displayed\noutside its boundaries. \n\n11) An error exists in Safari when launching an application while a\ncall approval dialog is shown. It is also possible to\nblock the user\u0027s ability to cancel the call. \n\n12) An error in Webkit can be exploited to disclose potentially\nsensitive data from form fields, although the \"Autocomplete\" feature\nis disabled. \n\nThis is related to vulnerability #8 in:\nSA32706\n\nSOLUTION:\nUpdate to iPhone OS 2.2 or iPhone OS for iPod touch 2.2 (downloadable\nand installable via iTunes). ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nOther vulnerabilities have also been reported of which some may also\naffect Safari version 3.x. \n\nSOLUTION:\nUpgrade to Safari version 4, which fixes the vulnerabilities. \n\nPROVIDED AND/OR DISCOVERED BY:\n1-3) Tavis Ormandy\n4) Chris Evans of Google Inc", "sources": [ { "db": "NVD", "id": "CVE-2008-2321" }, { "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "db": "BID", "id": "30483" }, { "db": "BID", "id": "30488" }, { "db": "VULHUB", "id": "VHN-32446" }, { "db": "PACKETSTORM", "id": "68761" }, { "db": "PACKETSTORM", "id": "78270" }, { "db": "PACKETSTORM", "id": "72169" }, { "db": "PACKETSTORM", "id": "78192" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-32446", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-32446" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-2321", "trust": 3.2 }, { "db": "BID", "id": "30488", "trust": 2.8 }, { "db": "SECUNIA", "id": "31326", "trust": 2.6 }, { "db": "BID", "id": "30483", "trust": 2.0 }, { "db": "SECUNIA", "id": "32756", "trust": 1.8 }, { "db": "SECUNIA", "id": "35379", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2009-1522", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-2268", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-3232", "trust": 1.7 }, { "db": "SECTRACK", "id": "1020603", "trust": 1.7 }, { "db": "XF", "id": "44127", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2008-001598", "trust": 0.8 }, { "db": "APPLE", "id": "APPLE-SA-2008-11-20", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2009-06-08-1", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2008-07-31", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200808-025", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-85438", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "32136", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-32446", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "68761", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "78270", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "72169", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "78192", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-32446" }, { "db": "BID", "id": "30483" }, { "db": "BID", "id": "30488" }, { "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "db": "PACKETSTORM", "id": "68761" }, { "db": "PACKETSTORM", "id": "78270" }, { "db": "PACKETSTORM", "id": "72169" }, { "db": "PACKETSTORM", "id": "78192" }, { "db": "CNNVD", "id": "CNNVD-200808-025" }, { "db": "NVD", "id": "CVE-2008-2321" } ] }, "id": "VAR-200807-0648", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-32446" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:48:38.695000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT3318", "trust": 0.8, "url": "http://support.apple.com/kb/HT3318" }, { "title": "HT3613", "trust": 0.8, "url": "http://support.apple.com/kb/HT3613" }, { "title": "HT2647", "trust": 0.8, "url": "http://support.apple.com/kb/HT2647" }, { "title": "HT2647", "trust": 0.8, "url": "http://support.apple.com/kb/HT2647?viewlocale=ja_JP" }, { "title": "HT3318", "trust": 0.8, "url": "http://support.apple.com/kb/HT3318?viewlocale=ja_JP" }, { "title": "HT3613", "trust": 0.8, "url": "http://support.apple.com/kb/HT3613?viewlocale=ja_JP" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001598" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-noinfo", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-32446" }, { "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "db": "NVD", "id": "CVE-2008-2321" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/30488" }, { "trust": 2.5, "url": "http://secunia.com/advisories/31326" }, { "trust": 2.1, "url": "http://support.apple.com/kb/ht3318" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "trust": 1.8, "url": "http://support.apple.com/kb/ht3613" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2008/nov/msg00002.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/30483" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1020603" }, { "trust": 1.7, "url": "http://secunia.com/advisories/32756" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35379" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2008/2268" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/44127" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/2268" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/3232" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44127" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2321" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2321" }, { "trust": 0.6, "url": "http://www.apple.com/macosx/" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/3232" }, { "trust": 0.3, "url": "/archive/1/504198" }, { "trust": 0.3, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/31326/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/about_secunia/64/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27863/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht2647" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008005leopard.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008005serverintel.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/22130/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30048/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008005intel.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008005serverppc.html" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30853/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30973/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008005ppc.html" }, { "trust": 0.1, "url": "http://secunia.com/product/96/" }, { "trust": 0.1, "url": "http://www.microsoft.com/technet/security/bulletin/ms09-019.mspx" }, { "trust": 0.1, "url": "http://www.opera.com/support/kb/view/882/" }, { "trust": 0.1, "url": "http://lcamtuf.coredump.cx/sftrap2/" }, { "trust": 0.1, "url": "http://www.microsoft.com/technet/security/bulletin/ms09-014.mspx" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-2321" }, { "trust": 0.1, "url": "http://lcamtuf.coredump.cx/stest/" }, { "trust": 0.1, "url": "http://lcamtuf.coredump.cx/canvas/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1684" }, { "trust": 0.1, "url": "http://lcamtuf.coredump.cx/ierace/" }, { "trust": 0.1, "url": "http://secunia.com/binary_analysis/sample_analysis/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32756/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32222/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/16074/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32706/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/15128/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/31610/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/35379/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/33970/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34723/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.1, "url": "http://scary.beasts.org/security/cesa-2009-006.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-32446" }, { "db": "BID", "id": "30483" }, { "db": "BID", "id": "30488" }, { "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "db": "PACKETSTORM", "id": "68761" }, { "db": "PACKETSTORM", "id": "78270" }, { "db": "PACKETSTORM", "id": "72169" }, { "db": "PACKETSTORM", "id": "78192" }, { "db": "CNNVD", "id": "CNNVD-200808-025" }, { "db": "NVD", "id": "CVE-2008-2321" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-32446" }, { "db": "BID", "id": "30483" }, { "db": "BID", "id": "30488" }, { "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "db": "PACKETSTORM", "id": "68761" }, { "db": "PACKETSTORM", "id": "78270" }, { "db": "PACKETSTORM", "id": "72169" }, { "db": "PACKETSTORM", "id": "78192" }, { "db": "CNNVD", "id": "CNNVD-200808-025" }, { "db": "NVD", "id": "CVE-2008-2321" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-08-04T00:00:00", "db": "VULHUB", "id": "VHN-32446" }, { "date": "2008-07-31T00:00:00", "db": "BID", "id": "30483" }, { "date": "2008-07-31T00:00:00", "db": "BID", "id": "30488" }, { "date": "2008-09-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "date": "2008-08-01T22:41:42", "db": "PACKETSTORM", "id": "68761" }, { "date": "2009-06-11T19:59:20", "db": "PACKETSTORM", "id": "78270" }, { "date": "2008-11-21T13:17:13", "db": "PACKETSTORM", "id": "72169" }, { "date": "2009-06-10T12:30:42", "db": "PACKETSTORM", "id": "78192" }, { "date": "2008-07-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200808-025" }, { "date": "2008-08-04T01:41:00", "db": "NVD", "id": "CVE-2008-2321" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-32446" }, { "date": "2008-08-01T17:57:00", "db": "BID", "id": "30483" }, { "date": "2009-06-11T22:09:00", "db": "BID", "id": "30488" }, { "date": "2009-07-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001598" }, { "date": "2021-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200808-025" }, { "date": "2024-11-21T00:46:36.607000", "db": "NVD", "id": "CVE-2008-2321" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "30483" }, { "db": "BID", "id": "30488" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X of CoreGraphics Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001598" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "30483" }, { "db": "BID", "id": "30488" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.