Lucene search

K
certCERTVU:552136
HistoryJan 16, 2007 - 12:00 a.m.

Apple Mac OS X UFS filesystem integer overflow vulnerability

2007-01-1600:00:00
www.kb.cert.org
9

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

35.7%

Overview

There is an integer overflow in the ffs_mountfs() function, which is used by Apple’s OS X operating system to handle UFS disc images.

Description

Unix File System (UFS) is a file system used by Unix and other similar operating systems. Apple OS X supports UFS, partitions, and images.

There is an integer overflow error in the ffs_mountfs() function that may occur when an OS X system opens a UFS disc image. To trigger the overflow, an attacker would need to convince a user to open a specially crafted disc image. Note that the Safari web browser’s default settings consider UFS disc images to be a safe file type, and will automatically open them after downloading.


Impact

A remote, unauthenticated attacker with the ability to supply a specially crafted DMG file may be able to cause an affected system to crash, thereby creating a denial of service. The original reporter states that an attacker may also be able to execute arbitrary code using this vulnerability. However, this has not been confirmed.


Solution

Upgrade
Apple has issued an upgrade to address this issue. See Apple Security Update 2007-003 for more details.


Disable “Open ‘safe’ files after downloading”

Disable the option “Open ‘safe’ files after downloading,” as specified in the Securing Your Web Browser document. This will help prevent automatic exploitation of this and other vulnerabilities.


Vendor Information

552136

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Apple Computer, Inc. __ Affected

Updated: March 13, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://docs.info.apple.com/article.html?artnum=305214&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23552136 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue was reported by LMH on the month of Apple bugs website.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-5679
Severity Metric: 1.14 Date Public:

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

35.7%

Related for VU:552136