Vulnerabilities > CVE-2006-0396 - Unspecified vulnerability in Apple mac OS X and mac OS X Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.
Vulnerable Configurations
Exploit-Db
description | Apple Mac OS X 10.4.5 Mail.app (Real Name) Buffer Overflow Exploit. CVE-2006-0396. Remote exploit for osx platform |
id | EDB-ID:1583 |
last seen | 2016-01-31 |
modified | 2006-03-13 |
published | 2006-03-13 |
reporter | Kevin Finisterre |
source | https://www.exploit-db.com/download/1583/ |
title | Apple Mac OS X 10.4.5 Mail.app Real Name Buffer Overflow Exploit |
Nessus
NASL family | MacOS X Local Security Checks |
NASL id | MACOSX_SECUPD2006-002.NASL |
description | The remote host is running Apple Mac OS X, but lacks Security Update 2006-002. This security update contains fixes for the following applications : apache_mod_php CoreTypes LaunchServices Mail Safari rsync |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21073 |
published | 2006-03-14 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21073 |
title | Mac OS X Multiple Vulnerabilities (Security Update 2006-002) |
code |
|
References
- http://docs.info.apple.com/article.html?artnum=303453
- http://docs.info.apple.com/article.html?artnum=303453
- http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html
- http://secunia.com/advisories/19129
- http://secunia.com/advisories/19129
- http://securitytracker.com/id?1015762
- http://securitytracker.com/id?1015762
- http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt
- http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt
- http://www.kb.cert.org/vuls/id/980084
- http://www.kb.cert.org/vuls/id/980084
- http://www.osvdb.org/23872
- http://www.osvdb.org/23872
- http://www.securityfocus.com/archive/1/427601/100/0/threaded
- http://www.securityfocus.com/archive/1/427601/100/0/threaded
- http://www.securityfocus.com/bid/17081
- http://www.securityfocus.com/bid/17081
- http://www.vupen.com/english/advisories/2006/0949
- http://www.vupen.com/english/advisories/2006/0949
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25209
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25209