Vulnerability Name:
CVE-2006-6129 (CCN-30547)
Assigned:
2006-11-26
Published:
2006-11-26
Updated:
2017-07-29
Summary:
Integer overflow in the fatfile_getarch2 in Apple Mac OS X allows local users to cause a denial of service and possibly execute arbitrary code via a crafted Mach-O Universal program that triggers memory corruption.
CVSS v3 Severity:
9.3 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
4.6 Medium
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
)
3.6 Low
(Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
7.2 High
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
)
5.6 Medium
(CCN Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Gain Privileges
References:
Source: MITRE
Type: CNA
CVE-2006-6129
Source: CCN
Type: Mac OS X 10.4.9 and Security Update 2007-003
About the security content of Mac OS X 10.4.9 and Security Update 2007-003
Source: CONFIRM
Type: UNKNOWN
http://docs.info.apple.com/article.html?artnum=305214
Source: APPLE
Type: UNKNOWN
APPLE-SA-2007-03-13
Source: CCN
Type: MOKB-26-11-2006
Mac OS X Universal Binary Loading Memory Corruption
Source: MISC
Type: Exploit
http://projects.info-pull.com/mokb/MOKB-26-11-2006.html
Source: CCN
Type: SA23088
Mac OS X Mach-O Universal Binary Memory Corruption
Source: SECUNIA
Type: UNKNOWN
23088
Source: CCN
Type: SA24479
Mac OS X Security Update Fixes Multiple Vulnerabilities
Source: SECUNIA
Type: UNKNOWN
24479
Source: CCN
Type: SECTRACK ID: 1017751
Mac OS X Lets Remote Users Execute Arbitrary Code and Local Users Obtain Elevated Privileges and Deny Service
Source: CCN
Type: Apple Web site
Apple - Support - Downloads
Source: CCN
Type: US-CERT VU#346656
Apple Mac OS X fails to properly handle corrupted Universal Mach-O Binaries
Source: OSVDB
Type: UNKNOWN
30706
Source: CCN
Type: OSVDB ID: 30706
Apple Mac OS X Mach-O Universal Binary fatfile_getarch2() Function Integer Overflow
Source: BID
Type: UNKNOWN
21291
Source: CCN
Type: BID-21291
Apple Mac OS X Mach-O Binary Loading Integer Overflow Vulnerability
Source: SECTRACK
Type: UNKNOWN
1017751
Source: CERT
Type: US Government Resource
TA07-072A
Source: VUPEN
Type: UNKNOWN
ADV-2006-4714
Source: VUPEN
Type: UNKNOWN
ADV-2007-0930
Source: XF
Type: UNKNOWN
macos-fatfile-getarch2-overflow(30547)
Source: XF
Type: UNKNOWN
macos-macho-universal-overflow(30547)
Vulnerable Configuration:
Configuration 1
:
cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
apple
mac os x 10.4.8
apple
mac os x server 10.4.8
apple
mac os x 10.3.9
apple
mac os x server 10.3.9
apple
mac os x 10.4
apple
mac os x 10.4.1
apple
mac os x server 10.4.1
apple
mac os x server 10.4
apple
mac os x server 10.4.2
apple
mac os x 10.4.2
apple
mac os x 10.4.4
apple
mac os x 10.4.3
apple
mac os x server 10.4.3
apple
mac os x server 10.4.4
apple
mac os x 10.4.5
apple
mac os x server 10.4.5
apple
mac os x 10.4.6
apple
mac os x server 10.4.6
apple
mac os x 10.4.7
apple
mac os x server 10.4.7
apple
mac os x server 10.4.8
apple
mac os x 10.4.8
apple
mac os x 10.4.10
apple
mac os x server 10.4.10
apple
mac os x 10.4.11
apple
mac os x server 10.4.11