ID CVE-2009-1236
Type cve
Reporter NVD
Modified 2017-09-28T21:34:15
Description
Heap-based buffer overflow in the AppleTalk networking stack in XNU 1228.3.13 and earlier on Apple Mac OS X 10.5.6 and earlier allows remote attackers to cause a denial of service (system crash) via a ZIP NOTIFY (aka ZIPOP_NOTIFY) packet that overwrites a certain ifPort structure member.
{"id": "CVE-2009-1236", "bulletinFamily": "NVD", "title": "CVE-2009-1236", "description": "Heap-based buffer overflow in the AppleTalk networking stack in XNU 1228.3.13 and earlier on Apple Mac OS X 10.5.6 and earlier allows remote attackers to cause a denial of service (system crash) via a ZIP NOTIFY (aka ZIPOP_NOTIFY) packet that overwrites a certain ifPort structure member.", "published": "2009-04-02T13:30:00", "modified": "2017-09-28T21:34:15", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1236", "reporter": "NVD", "references": ["http://www.digit-labs.org/files/exploits/xnu-appletalk-zip.c", "https://www.exploit-db.com/exploits/8262", "http://www.informationweek.com/news/hardware/mac/showArticle.jhtml?articleID=216401181", "http://www.securityfocus.com/bid/34201"], "cvelist": ["CVE-2009-1236"], "type": "cve", "lastseen": "2017-09-29T14:26:34", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/o:apple:mac_os_x:10.3.4", "cpe:/o:apple:mac_os_x_server:10.4.8", "cpe:/o:apple:mac_os_x:10.3", "cpe:/o:apple:mac_os_x:10.3.3", "cpe:/o:apple:mac_os_x:10.2.8", "cpe:/o:apple:mac_os_x_server:10.0", "cpe:/o:apple:mac_os_x_server:10.1.5", "cpe:/o:apple:mac_os_x:10.4.8::macbook_pro", "cpe:/o:apple:mac_os_x_server:10.3.8", "cpe:/o:apple:mac_os_x:10.4.3", "cpe:/o:apple:mac_os_x:10.3.7", "cpe:/o:apple:mac_os_x_server:10.5.3", "cpe:/o:apple:mac_os_x_server:10.3.7", "cpe:/o:apple:mac_os_x_server:10.0.1", "cpe:/o:apple:mac_os_x_server:10.3.1", "cpe:/o:apple:mac_os_x:10.3.0", "cpe:/o:apple:mac_os_x_server:10.5.1", "cpe:/o:apple:mac_os_x_server:10.3.0", "cpe:/o:apple:mac_os_x_server:10.4.5", "cpe:/o:apple:mac_os_x:10.0.1", "cpe:/o:apple:mac_os_x:10.4.8::mac_mini", "cpe:/o:apple:mac_os_x:10.4.8", "cpe:/o:apple:mac_os_x_server:10.4.2", "cpe:/o:apple:mac_os_x:10.3.8", "cpe:/o:apple:mac_os_x:10.0.0", "cpe:/o:apple:mac_os_x:10.4.9", "cpe:/o:apple:mac_os_x_server:10.2.3", "cpe:/o:apple:mac_os_x_server:10.2.2", "cpe:/o:apple:mac_os_x_server:10.5.0", "cpe:/o:apple:mac_os_x:10.4", "cpe:/o:apple:mac_os_x:10.5.0", "cpe:/o:apple:mac_os_x:10.2.7", "cpe:/o:apple:mac_os_x_server:10.4.6", "cpe:/o:apple:mac_os_x:10.5.1", "cpe:/o:apple:mac_os_x:10.2.0", "cpe:/o:apple:mac_os_x_server:10.0.2", "cpe:/o:apple:mac_os_x_server:10.3.4", "cpe:/o:apple:mac_os_x:10.1.3", "cpe:/o:apple:mac_os_x:10.2.4", "cpe:/o:apple:mac_os_x_server:10.4.4", "cpe:/o:apple:mac_os_x_server:10.1.4", "cpe:/o:apple:mac_os_x:10.5.4", "cpe:/o:apple:mac_os_x_server:10.5.5", "cpe:/o:apple:mac_os_x:10.5.5", "cpe:/o:apple:mac_os_x:10.0.3", "cpe:/o:apple:mac_os_x:10.4.8::macbook", "cpe:/o:apple:mac_os_x:10.0.2", "cpe:/o:apple:mac_os_x_server:10.5", "cpe:/o:apple:mac_os_x:10.5.3", "cpe:/o:apple:mac_os_x_server:10.0.4", "cpe:/o:apple:mac_os_x_server:10.4.10", "cpe:/o:apple:mac_os_x:10.1.5", "cpe:/o:apple:mac_os_x_server:10.2.4", "cpe:/o:apple:mac_os_x:10.3.2", "cpe:/o:apple:mac_os_x_server:10.0.3", "cpe:/o:apple:mac_os_x_server:10.4.1", "cpe:/o:apple:mac_os_x_server:10.3.6", "cpe:/o:apple:mac_os_x:10.2.2", "cpe:/o:apple:mac_os_x:10.5", "cpe:/o:apple:mac_os_x_server:10.4.9", "cpe:/o:apple:mac_os_x:10.5.2:2008-002", "cpe:/o:apple:mac_os_x:10.4.11", "cpe:/o:apple:mac_os_x:10.3.9", "cpe:/o:apple:mac_os_x_server:10.1.1", "cpe:/o:apple:mac_os_x_server:10.2.6", "cpe:/o:apple:mac_os_x:10.4.1", "cpe:/o:apple:mac_os_x_server:10.0.0", "cpe:/o:apple:mac_os_x:10.4.10", "cpe:/o:apple:mac_os_x_server:10.3.2", "cpe:/o:apple:mac_os_x:10.1", "cpe:/o:apple:mac_os_x_server:10.2", "cpe:/o:apple:mac_os_x_server:10.4.0", "cpe:/o:apple:mac_os_x:10.4.2", "cpe:/o:apple:mac_os_x:10.4.6", "cpe:/o:apple:mac_os_x:10.3.1", "cpe:/o:apple:mac_os_x_server:10.1.0", "cpe:/o:apple:mac_os_x:10.4.0", "cpe:/o:apple:mac_os_x:10.1.2", "cpe:/o:apple:mac_os_x_server:10.5.2", "cpe:/o:apple:mac_os_x:10.2.6", "cpe:/o:apple:mac_os_x_server:10.3.9", "cpe:/o:apple:mac_os_x_server:10.3", "cpe:/o:apple:mac_os_x_server:10.4.3", "cpe:/o:apple:mac_os_x_server:10.2.0", "cpe:/o:apple:mac_os_x:10.2", "cpe:/o:apple:mac_os_x:10.2.1", "cpe:/o:apple:mac_os_x:10.0", "cpe:/o:apple:mac_os_x:10.3.6", "cpe:/o:apple:mac_os_x:10.1.4", "cpe:/o:apple:mac_os_x_server:10.1.3", "cpe:/o:apple:mac_os_x_server:10.3.5", "cpe:/o:apple:mac_os_x:10.4.7", "cpe:/o:apple:mac_os_x:10.2.3", "cpe:/o:apple:mac_os_x_server:10.1.2", "cpe:/o:apple:mac_os_x_server:10.3.3", "cpe:/o:apple:mac_os_x_server:10.2.1", "cpe:/o:apple:mac_os_x:10.0.4", "cpe:/o:apple:mac_os_x_server:10.5.4", "cpe:/o:apple:mac_os_x_server:10.4", "cpe:/o:apple:mac_os_x_server:10.4.7", "cpe:/o:apple:mac_os_x_server:10.2.5", "cpe:/o:apple:mac_os_x_server:10.1", "cpe:/o:apple:mac_os_x_server:10.2.8", "cpe:/o:apple:mac_os_x:10.3.5", "cpe:/o:apple:mac_os_x:10.2.5", "cpe:/o:apple:mac_os_x:10.4.5", "cpe:/o:apple:mac_os_x:10.1.1", "cpe:/o:apple:mac_os_x_server:10.5.6", "cpe:/o:apple:mac_os_x:10.4.4", "cpe:/o:apple:mac_os_x:10.1.0", "cpe:/o:apple:mac_os_x:10.5.6", "cpe:/o:apple:mac_os_x:10.5.2", "cpe:/o:apple:mac_os_x_server:10.4.11", "cpe:/o:apple:mac_os_x_server:10.2.7"], "cvelist": ["CVE-2009-1236"], "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "Heap-based buffer overflow in the AppleTalk networking stack in XNU 1228.3.13 and earlier on Apple Mac OS X 10.5.6 and earlier allows remote attackers to cause a denial of service (system crash) via a ZIP NOTIFY (aka ZIPOP_NOTIFY) packet that overwrites a certain ifPort structure member.", "edition": 1, "enchantments": {}, "hash": "bbda769df51e033dff2778d85004e378689afb5d87066c85ea719402d57cedfe", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "fcb58457a77f57d68cac448206607fc6", "key": "href"}, {"hash": "9206809490c6f88c76e920ba024f0f3d", "key": "published"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "145b451ceb7bdbc2cb0c7fd1ccd20ffd", "key": "description"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "c661fcf816f0b2d47d26ae568e6e682d", "key": "title"}, {"hash": "a825fca8a41cfe47a2a9176b490ec687", "key": "cvelist"}, {"hash": "8c2a6c7ab215485f08ec309996e69c25", "key": "modified"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "6a3f50bd49606c51ac17dcfee5ee88fc", "key": "cpe"}, {"hash": "cd3bba2a727c99d738ef93cc31334d7c", "key": "references"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1236", "id": "CVE-2009-1236", "lastseen": "2016-09-03T12:16:49", "modified": "2009-04-18T01:48:17", "objectVersion": "1.2", "published": "2009-04-02T13:30:00", "references": ["http://www.digit-labs.org/files/exploits/xnu-appletalk-zip.c", "http://www.milw0rm.com/exploits/8262", "http://www.informationweek.com/news/hardware/mac/showArticle.jhtml?articleID=216401181", "http://www.securityfocus.com/bid/34201"], "reporter": "NVD", "scanner": [], "title": "CVE-2009-1236", "type": "cve", "viewCount": 1}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T12:16:49"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "6a3f50bd49606c51ac17dcfee5ee88fc"}, {"key": "cvelist", "hash": "a825fca8a41cfe47a2a9176b490ec687"}, {"key": "cvss", "hash": "2bdabeb49c44761f9565717ab0e38165"}, {"key": "description", "hash": "145b451ceb7bdbc2cb0c7fd1ccd20ffd"}, {"key": "href", "hash": "fcb58457a77f57d68cac448206607fc6"}, {"key": "modified", "hash": "c4219506ba10f4a7749943b4bcb02f11"}, {"key": "published", "hash": "9206809490c6f88c76e920ba024f0f3d"}, {"key": "references", "hash": "36211edf714176d63cc62874c0d117ae"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "c661fcf816f0b2d47d26ae568e6e682d"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "f554eb14d477ee056f88251e183f4d2b9b2c9d4eeac60711d2d9e87588e05289", "viewCount": 1, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "cpe": ["cpe:/o:apple:mac_os_x:10.3.4", "cpe:/o:apple:mac_os_x_server:10.4.8", "cpe:/o:apple:mac_os_x:10.3", "cpe:/o:apple:mac_os_x:10.3.3", "cpe:/o:apple:mac_os_x:10.2.8", "cpe:/o:apple:mac_os_x_server:10.0", "cpe:/o:apple:mac_os_x_server:10.1.5", "cpe:/o:apple:mac_os_x:10.4.8::macbook_pro", "cpe:/o:apple:mac_os_x_server:10.3.8", "cpe:/o:apple:mac_os_x:10.4.3", "cpe:/o:apple:mac_os_x:10.3.7", "cpe:/o:apple:mac_os_x_server:10.5.3", "cpe:/o:apple:mac_os_x_server:10.3.7", "cpe:/o:apple:mac_os_x_server:10.0.1", "cpe:/o:apple:mac_os_x_server:10.3.1", "cpe:/o:apple:mac_os_x:10.3.0", "cpe:/o:apple:mac_os_x_server:10.5.1", "cpe:/o:apple:mac_os_x_server:10.3.0", "cpe:/o:apple:mac_os_x_server:10.4.5", "cpe:/o:apple:mac_os_x:10.0.1", "cpe:/o:apple:mac_os_x:10.4.8::mac_mini", "cpe:/o:apple:mac_os_x:10.4.8", "cpe:/o:apple:mac_os_x_server:10.4.2", "cpe:/o:apple:mac_os_x:10.3.8", "cpe:/o:apple:mac_os_x:10.0.0", "cpe:/o:apple:mac_os_x:10.4.9", "cpe:/o:apple:mac_os_x_server:10.2.3", "cpe:/o:apple:mac_os_x_server:10.2.2", "cpe:/o:apple:mac_os_x_server:10.5.0", "cpe:/o:apple:mac_os_x:10.4", "cpe:/o:apple:mac_os_x:10.5.0", "cpe:/o:apple:mac_os_x:10.2.7", "cpe:/o:apple:mac_os_x_server:10.4.6", "cpe:/o:apple:mac_os_x:10.5.1", "cpe:/o:apple:mac_os_x:10.2.0", "cpe:/o:apple:mac_os_x_server:10.0.2", "cpe:/o:apple:mac_os_x_server:10.3.4", "cpe:/o:apple:mac_os_x:10.1.3", "cpe:/o:apple:mac_os_x:10.2.4", "cpe:/o:apple:mac_os_x_server:10.4.4", "cpe:/o:apple:mac_os_x_server:10.1.4", "cpe:/o:apple:mac_os_x:10.5.4", "cpe:/o:apple:mac_os_x_server:10.5.5", "cpe:/o:apple:mac_os_x:10.5.5", "cpe:/o:apple:mac_os_x:10.0.3", "cpe:/o:apple:mac_os_x:10.4.8::macbook", "cpe:/o:apple:mac_os_x:10.0.2", "cpe:/o:apple:mac_os_x_server:10.5", "cpe:/o:apple:mac_os_x:10.5.3", "cpe:/o:apple:mac_os_x_server:10.0.4", "cpe:/o:apple:mac_os_x_server:10.4.10", "cpe:/o:apple:mac_os_x:10.1.5", "cpe:/o:apple:mac_os_x_server:10.2.4", "cpe:/o:apple:mac_os_x:10.3.2", "cpe:/o:apple:mac_os_x_server:10.0.3", "cpe:/o:apple:mac_os_x_server:10.4.1", "cpe:/o:apple:mac_os_x_server:10.3.6", "cpe:/o:apple:mac_os_x:10.2.2", "cpe:/o:apple:mac_os_x:10.5", "cpe:/o:apple:mac_os_x_server:10.4.9", "cpe:/o:apple:mac_os_x:10.5.2:2008-002", "cpe:/o:apple:mac_os_x:10.4.11", "cpe:/o:apple:mac_os_x:10.3.9", "cpe:/o:apple:mac_os_x_server:10.1.1", "cpe:/o:apple:mac_os_x_server:10.2.6", "cpe:/o:apple:mac_os_x:10.4.1", "cpe:/o:apple:mac_os_x_server:10.0.0", "cpe:/o:apple:mac_os_x:10.4.10", "cpe:/o:apple:mac_os_x_server:10.3.2", "cpe:/o:apple:mac_os_x:10.1", "cpe:/o:apple:mac_os_x_server:10.2", "cpe:/o:apple:mac_os_x_server:10.4.0", "cpe:/o:apple:mac_os_x:10.4.2", "cpe:/o:apple:mac_os_x:10.4.6", "cpe:/o:apple:mac_os_x:10.3.1", "cpe:/o:apple:mac_os_x_server:10.1.0", "cpe:/o:apple:mac_os_x:10.4.0", "cpe:/o:apple:mac_os_x:10.1.2", "cpe:/o:apple:mac_os_x_server:10.5.2", "cpe:/o:apple:mac_os_x:10.2.6", "cpe:/o:apple:mac_os_x_server:10.3.9", "cpe:/o:apple:mac_os_x_server:10.3", "cpe:/o:apple:mac_os_x_server:10.4.3", "cpe:/o:apple:mac_os_x_server:10.2.0", "cpe:/o:apple:mac_os_x:10.2", "cpe:/o:apple:mac_os_x:10.2.1", "cpe:/o:apple:mac_os_x:10.0", "cpe:/o:apple:mac_os_x:10.3.6", "cpe:/o:apple:mac_os_x:10.1.4", "cpe:/o:apple:mac_os_x_server:10.1.3", "cpe:/o:apple:mac_os_x_server:10.3.5", "cpe:/o:apple:mac_os_x:10.4.7", "cpe:/o:apple:mac_os_x:10.2.3", "cpe:/o:apple:mac_os_x_server:10.1.2", "cpe:/o:apple:mac_os_x_server:10.3.3", "cpe:/o:apple:mac_os_x_server:10.2.1", "cpe:/o:apple:mac_os_x:10.0.4", "cpe:/o:apple:mac_os_x_server:10.5.4", "cpe:/o:apple:mac_os_x_server:10.4", "cpe:/o:apple:mac_os_x_server:10.4.7", "cpe:/o:apple:mac_os_x_server:10.2.5", "cpe:/o:apple:mac_os_x_server:10.1", "cpe:/o:apple:mac_os_x_server:10.2.8", "cpe:/o:apple:mac_os_x:10.3.5", "cpe:/o:apple:mac_os_x:10.2.5", "cpe:/o:apple:mac_os_x:10.4.5", "cpe:/o:apple:mac_os_x:10.1.1", "cpe:/o:apple:mac_os_x_server:10.5.6", "cpe:/o:apple:mac_os_x:10.4.4", "cpe:/o:apple:mac_os_x:10.1.0", "cpe:/o:apple:mac_os_x:10.5.6", "cpe:/o:apple:mac_os_x:10.5.2", "cpe:/o:apple:mac_os_x_server:10.4.11", "cpe:/o:apple:mac_os_x_server:10.2.7"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"result": {"exploitdb": [{"id": "EDB-ID:8262", "type": "exploitdb", "title": "Mac OS X xnu <= 1228.3.13 zip-notify Remote Kernel Overflow PoC", "description": "Mac OS X xnu <= 1228.3.13 (zip-notify) Remote Kernel Overflow PoC. CVE-2009-1236. Dos exploit for osx platform", "published": "2009-03-23T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/8262/", "cvelist": ["CVE-2009-1236"], "lastseen": "2016-02-01T05:06:14"}]}}