Apple Mac OS X AFP server vulnerable to DoS via maliciously-crafted AFP request

2006-08-04T00:00:00
ID VU:180692
Type cert
Reporter CERT
Modified 2006-09-18T00:00:00

Description

Overview

A vulnerability in the Apple Mac OS X AFP server may allow an attacker to cause a denial-of-service condition on an affected system.

Description

The AFP (Apple Filing Protocol) service allows Apple Mac OS clients to access files remotely from a server. Apple's Mac OS X AFP server contains an unchecked error condition. When file sharing is enabled, a remote attacker can exploit this vulnerability by sending a specially crafted invalid AFP request. This crafted AFP request may cause the service to crash, resulting in a denial-of-service condition. Apple states that any Mac OS X system with AFP server enabled is vulnerable; however, AFP server is not enabled by default on Apple Mac OS X.


Impact

When file sharing is enabled, a maliciously crafted AFP request may cause the AFP server to crash, resulting in a denial-of-service condition.


Solution

Apply an update

Apple has addressed this issue in Security Update 2006-004.


Workaround

Disable file sharing if it is not required. File sharing can be disabled in the "Sharing" settings of system preferences.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Apple Computer, Inc.| | 02 Aug 2006| 04 Aug 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://docs.info.apple.com/article.html?artnum=304063>
  • <http://secunia.com/advisories/21253/>

Credit

Thanks to Apple Product Security for reporting this vulnerability.

This document was written by Katie Washok.

Other Information

  • CVE IDs: CVE-2006-3496
  • Date Public: 01 Aug 2006
  • Date First Published: 04 Aug 2006
  • Date Last Updated: 18 Sep 2006
  • Severity Metric: 0.81
  • Document Revision: 21