Vulnerability Name:

CVE-2008-2320 (CCN-44126)

Assigned:2008-08-01
Published:2008-08-01
Updated:2018-10-11
Summary:Stack-based buffer overflow in CarbonCore in Apple Mac OS X 10.4.11 and 10.5.4, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long filename to the file management API.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-2320

Source: APPLE
Type: Patch
APPLE-SA-2008-07-31

Source: APPLE
Type: Patch
APPLE-SA-2009-06-08-1

Source: APPLE
Type: Patch
APPLE-SA-2009-06-17-1

Source: CCN
Type: SA31326
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
31326

Source: CCN
Type: SA35379
Apple Safari Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
35379

Source: CCN
Type: SECTRACK ID: 1020602
Mac OS X CarbonCore Stack Overflow in Processing Filenames Lets Users Execute Arbitrary Code

Source: CCN
Type: Apple Web site
About Security Update 2008-005

Source: CONFIRM
Type: Patch, Vendor Advisory
http://support.apple.com/kb/HT3613

Source: CONFIRM
Type: Patch, Vendor Advisory
http://support.apple.com/kb/HT3639

Source: CCN
Type: OSVDB ID: 48569
Apple Mac OS X CarbonCore File Management API Filename Handling Overflow

Source: BUGTRAQ
Type: UNKNOWN
20080801 n.runs-SA-2008.005 - Apple Inc. - CoreServices Frameworkâ??s CarbonCore Framework - Arbitrary Code Execution (remote)

Source: BID
Type: Patch
30483

Source: CCN
Type: BID-30483
RETIRED: Apple Mac OS X 2008-005 Multiple Security Vulnerabilities

Source: BID
Type: Patch
30487

Source: CCN
Type: BID-30487
Apple Mac OS X CarbonCore Stack Based Buffer Overflow Vulnerability

Source: SECTRACK
Type: UNKNOWN
1020602

Source: VUPEN
Type: Vendor Advisory
ADV-2008-2268

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2009-1522

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2009-1621

Source: XF
Type: UNKNOWN
macosx-carboncore-bo(44126)

Source: XF
Type: UNKNOWN
macosx-carboncore-bo(44126)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
  • AND
  • cpe:/a:apple:carboncore:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.2:-:mac:*:*:*:*:*
  • AND
  • cpe:/a:apple:safari:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:4.0:beta:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:0.9:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple mac os x 10.4.11
    apple mac os x 10.5.4
    apple mac os x server 10.4.11
    apple mac os x server 10.5.4
    apple carboncore *
    apple mac os x 10.4.11
    apple mac os x server 10.4.11
    apple mac os x 10.5.4
    apple mac os x server 10.5.4
    apple safari 3.0.2 -
    apple safari 2.0.2
    apple safari 2.0.4
    apple safari 3.0.1
    apple safari 3.0.2
    apple safari 3.0.3
    apple safari 3.1
    apple safari 1.3.1
    apple safari 1.3
    apple safari 1.2
    apple safari 1.1
    apple safari 1.0
    apple safari 2.0
    apple safari 3.0
    apple safari 3.0.4
    apple safari 3.1.1
    apple safari 3.1.2
    apple safari 3.2
    apple safari 3.2.1
    apple safari 3.2.2
    apple mac os x 10.5.7
    apple mac os x server 10.5.7
    apple safari 1.0.3
    apple safari 1.3.2
    apple safari 0.8
    apple safari 3.2.3
    apple safari 4.0 beta
    apple safari 0.9