Vulnerabilities > CVE-2006-5679 - Numeric Errors vulnerability in Freebsd 6.1
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Integer overflow in the ffs_mountfs function in FreeBSD 6.1 allows local users to cause a denial of service (panic) and possibly execute arbitrary code via a crafted UFS filesystem that causes invalid or large size parameters to be provided to the kmem_alloc function. NOTE: a third party states that this issue does not cross privilege boundaries in FreeBSD because only root may mount a filesystem.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | MacOS X Local Security Checks |
NASL id | MACOSX_10_4_9.NASL |
description | The remote host is running a version of Mac OS X 10.4 which is older than version 10.4.9 or a version of Mac OS X 10.3 which does not have Security Update 2007-003 applied. This update contains several security fixes for the following programs : - ColorSync - CoreGraphics - Crash Reporter - CUPS - Disk Images - DS Plugins - Flash Player - GNU Tar - HFS - HID Family - ImageIO - Kernel - MySQL server - Networking - OpenSSH - Printing - QuickDraw Manager - servermgrd - SMB File Server - Software Update - sudo - WebLog |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24811 |
published | 2007-03-13 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24811 |
title | Mac OS X < 10.4.9 Multiple Vulnerabilities (Security Update 2007-003) |
code |
|
References
- http://docs.info.apple.com/article.html?artnum=305214
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://lists.freebsd.org/pipermail/freebsd-security/2007-January/004218.html
- http://projects.info-pull.com/mokb/MOKB-03-11-2006.html
- http://secunia.com/advisories/22736
- http://secunia.com/advisories/24479
- http://www.kb.cert.org/vuls/id/552136
- http://www.securityfocus.com/bid/20918
- http://www.securitytracker.com/id?1017751
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2007/0930