Vulnerabilities > CVE-2007-0463 - Unspecified vulnerability in Apple Software Update 2.0.5
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via format string specifiers in (1) SWUTMP or (2) SUCATALOG filenames, or using the (3) application/x-apple.sucatalog+xml MIME type.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Apple 10.4.x Software Update Format String Vulnerability. CVE-2007-0463. Dos exploit for osx platform |
id | EDB-ID:29523 |
last seen | 2016-02-03 |
modified | 2007-01-25 |
published | 2007-01-25 |
reporter | kf |
source | https://www.exploit-db.com/download/29523/ |
title | Apple 10.4.x Software Update Format String Vulnerability |
Nessus
NASL family | MacOS X Local Security Checks |
NASL id | MACOSX_10_4_9.NASL |
description | The remote host is running a version of Mac OS X 10.4 which is older than version 10.4.9 or a version of Mac OS X 10.3 which does not have Security Update 2007-003 applied. This update contains several security fixes for the following programs : - ColorSync - CoreGraphics - Crash Reporter - CUPS - Disk Images - DS Plugins - Flash Player - GNU Tar - HFS - HID Family - ImageIO - Kernel - MySQL server - Networking - OpenSSH - Printing - QuickDraw Manager - servermgrd - SMB File Server - Software Update - sudo - WebLog |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24811 |
published | 2007-03-13 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24811 |
title | Mac OS X < 10.4.9 Multiple Vulnerabilities (Security Update 2007-003) |
code |
|
References
- http://docs.info.apple.com/article.html?artnum=305214
- http://docs.info.apple.com/article.html?artnum=305214
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
- http://projects.info-pull.com/moab/MOAB-24-01-2007.html
- http://projects.info-pull.com/moab/MOAB-24-01-2007.html
- http://secunia.com/advisories/24479
- http://secunia.com/advisories/24479
- http://www.osvdb.org/32703
- http://www.osvdb.org/32703
- http://www.securityfocus.com/bid/22222
- http://www.securityfocus.com/bid/22222
- http://www.securitytracker.com/id?1017755
- http://www.securitytracker.com/id?1017755
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.us-cert.gov/cas/techalerts/TA07-072A.html
- http://www.vupen.com/english/advisories/2007/0337
- http://www.vupen.com/english/advisories/2007/0337
- http://www.vupen.com/english/advisories/2007/0930
- http://www.vupen.com/english/advisories/2007/0930