Vulnerabilities > CVE-2006-0395 - Multiple vulnerability in Apple Mac OS X Security Update 2006-001

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
apple
nessus
exploit available
metasploit

Summary

The Download Validation in Mail in Mac OS X 10.4 does not properly recognize attachment file types to warn a user of an unsafe type, which allows user-assisted remote attackers to execute arbitrary code via crafted file types.

Vulnerable Configurations

Part Description Count
OS
Apple
2

Exploit-Db

  • descriptionMail.App 10.5.0 Image Attachment Command Execution (OS X). CVE-2006-0395. Remote exploit for osx platform
    idEDB-ID:9929
    last seen2016-02-01
    modified2006-03-01
    published2006-03-01
    reporterH D Moore
    sourcehttps://www.exploit-db.com/download/9929/
    titleMail.App 10.5.0 - Image Attachment Command Execution OS X
  • descriptionMail.app Image Attachment Command Execution. CVE-2006-0395,CVE-2007-6165. Remote exploits for multiple platform
    idEDB-ID:16870
    last seen2016-02-02
    modified2011-03-05
    published2011-03-05
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16870/
    titleMail.app Image Attachment Command Execution

Metasploit

descriptionThis module exploits a command execution vulnerability in the Mail.app application shipped with Mac OS X 10.5.0. This flaw was patched in 10.4 in March of 2007, but reintroduced into the final release of 10.5.
idMSF:EXPLOIT/OSX/EMAIL/MAILAPP_IMAGE_EXEC
last seen2020-01-08
modified2017-07-24
published2007-11-26
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/osx/email/mailapp_image_exec.rb
titleMail.app Image Attachment Command Execution

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_SECUPD2006-001.NASL
descriptionThe remote host is running Apple Mac OS X, but lacks Security Update 2006-001. This security update contains fixes for the following applications : apache_mod_php automount Bom Directory Services iChat IPSec LaunchServices LibSystem loginwindow Mail rsync Safari Syndication
last seen2020-06-01
modified2020-06-02
plugin id20990
published2006-03-02
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20990
titleMac OS X Multiple Vulnerabilities (Security Update 2006-001)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(20990);
 script_version("1.23");
 script_cvs_date("Date: 2018/07/14  1:59:35");

 script_cve_id("CVE-2005-2713", "CVE-2005-2714", "CVE-2005-3319", "CVE-2005-3353", "CVE-2005-3391",
               "CVE-2005-3392", "CVE-2005-3706", "CVE-2005-3712", "CVE-2005-4217", "CVE-2005-4504",
               "CVE-2006-0383", "CVE-2006-0384", "CVE-2006-0386", "CVE-2006-0387", "CVE-2006-0388",
               "CVE-2006-0389", "CVE-2006-0391", "CVE-2006-0395", "CVE-2006-0848");
 script_bugtraq_id(16736, 16907);

 script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2006-001)");
 script_summary(english:"Check for Security Update 2006-001");

 script_set_attribute(attribute:"synopsis", value:"The remote operating system is missing a vendor-supplied patch.");
 script_set_attribute(attribute:"description", value:
"The remote host is running Apple Mac OS X, but lacks
Security Update 2006-001.

This security update contains fixes for the following
applications :

apache_mod_php
automount
Bom
Directory Services
iChat
IPSec
LaunchServices
LibSystem
loginwindow
Mail
rsync
Safari
Syndication");
 script_set_attribute(attribute:"see_also", value:"http://docs.info.apple.com/article.html?artnum=303382");
 script_set_attribute(attribute:"solution", value:
"Mac OS X 10.4 :
http://www.apple.com/support/downloads/securityupdate2006001macosx1045ppc.html
http://www.apple.com/support/downloads/securityupdate2006001macosx1045intel.html

Mac OS X 10.3 :
http://www.apple.com/support/downloads/securityupdate20060011039client.html
http://www.apple.com/support/downloads/securityupdate20060011039server.html");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Safari Archive Metadata Command Execution');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2005/12/21");
 script_set_attribute(attribute:"patch_publication_date", value:"2006/03/03");
 script_set_attribute(attribute:"plugin_publication_date", value:"2006/03/02");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
 script_family(english:"MacOS X Local Security Checks");

 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/MacOSX/packages");
 exit(0);
}


packages = get_kb_item("Host/MacOSX/packages");
if ( ! packages ) exit(0);


uname = get_kb_item("Host/uname");
if ( egrep(pattern:"Darwin.* (7\.[0-9]\.|8\.[0-5]\.)", string:uname) )
{
  if (!egrep(pattern:"^SecUpd(Srvr)?(2006-00[123467]|2007-003)", string:packages)) security_hole(0);
}

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82307/mailapp_image_exec.rb.txt
idPACKETSTORM:82307
last seen2016-12-05
published2009-10-28
reporterH D Moore
sourcehttps://packetstormsecurity.com/files/82307/Mail.app-Image-Attachment-Command-Execution.html
titleMail.app Image Attachment Command Execution