Lucene search

K
certCERTVU:515792
HistoryMar 15, 2007 - 12:00 a.m.

Apple Mac OS X DMG UFS byte_swap_sbin() function Integer Overflow

2007-03-1500:00:00
www.kb.cert.org
16

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.012

Percentile

85.0%

Overview

The Apple Mac OS X byte_swap_sbin() function contains an integer overflow vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

Description

DMG files are disk images that can contain a variety of filesystems. Apple Mac OS X contains an integer overflow vulnerability in the byte_swap_bin() function in the UFS filesystem handling code.


Impact

By convincing a user to mount a specially-crafted DMG file, such as by viewing a web page with Safari, a remote, unauthenticated attacker may be able to execute code with the privileges of the user or cause a denial-of-service condition. Note that it is reported that it is unlikely that code execution can take place as a result of this vulnerability.


Solution

Apply an update

Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. See Apple Security Update 2007-003 for more details.


Do not open untrusted Apple disk images

Do not open unfamiliar or unexpected Apple disk images, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010.

Disable “Open ‘safe’ files after downloading”** in Safari**

Disable the option “Open ‘safe’ files after downloading” in Safari, as specified in the Securing Your Web Browser document. This will help prevent automatic exploitation of this and other vulnerabilities.


Vendor Information

515792

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Apple Computer, Inc. __ Affected

Updated: March 15, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Apple Security Update 2007-003 for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23515792 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by LMH.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2007-0299
Severity Metric: 7.01 Date Public:

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.012

Percentile

85.0%