CVE-2006-6127
https://notcve.org/view.php?id=CVE-2006-6127
Apple Mac OS X kernel allows local users to cause a denial of service via a process that uses kevent to register a queue and an event, then fork a child process that uses kevent to register an event for the same queue as the parent. Núcleo Apple Mac OS X permite a un usuario local provocar denegación de servicio a través de un proceso que usa kevent para registrar una cola o un evento, entonces se bifurca en un proceso hijo que usa kevent para registrar un evento para la misma cola que la del padre. • http://docs.info.apple.com/article.html?artnum=307041 http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html http://projects.info-pull.com/mokb/MOKB-24-11-2006.html http://secunia.com/advisories/23114 http://secunia.com/advisories/27643 http://www.osvdb.org/30695 http://www.securityfocus.com/bid/21285 http://www.securityfocus.com/bid/26444 http://www.us-cert.gov/cas/techalerts/TA07-319A.html http://www.vupen.com/english/advisories/2006/4715 http: •
CVE-2006-6126
https://notcve.org/view.php?id=CVE-2006-6126
Apple Mac OS X allows local users to cause a denial of service (memory corruption) via a crafted Mach-O binary with a malformed load_command data structure. Apple Mac OS X permite a un usuario local provocar denegación de servicio (memoria corrupta) a través del binario manipulado Mach-O con una estructura de datos mal formada load_command. • http://projects.info-pull.com/mokb/MOKB-23-11-2006.html http://www.osvdb.org/30740 http://www.securityfocus.com/bid/21272 http://www.vupen.com/english/advisories/2006/4714 https://exchange.xforce.ibmcloud.com/vulnerabilities/30549 •
CVE-2006-6062 – Apple Mac OSX 10.4.8 - UDIF Disk Image Remote Denial of Service
https://notcve.org/view.php?id=CVE-2006-6062
Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a malformed UDTO HFS+ disk image, such as with "bad sectors," which triggers memory corruption. Vulnerabilidad no especificada en Apple Mac OSX 10.4.8, y posiblemente otras versiones, permite a atacantes remotos provocar una denegación de servicio (caída) mediante una imagen de disco UDTO HFS+ mal formada, como por ejemplo con "sectores dañados", lo cual provoca una corrupción de memoria. • https://www.exploit-db.com/exploits/29144 https://www.exploit-db.com/exploits/29161 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-21-11-2006.html http://secunia.com/advisories/23012 http://secunia.com/advisories/23062 http://secunia.com/advisories/24479 http://securitytracker.com/id?1017260 http://www.osvdb.org/30510 http://www.securityfocus.com/bid& •
CVE-2006-6061
https://notcve.org/view.php?id=CVE-2006-6061
com.apple.AppleDiskImageController in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to execute arbitrary code via a malformed DMG image that triggers memory corruption. NOTE: the severity of this issue has been disputed by a third party, who states that the impact is limited to a denial of service (kernel panic) due to a vm_fault call with a non-aligned address. com.apple.AppleDiskImagecontroller en Apple Mac OS X 10.4.8, y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante una imagen DMG mal formada que provoca una corrupción de memoria. NOTA: la severidad de este asunto ha sido impugnada por una tercera parte, la cual afirma que el impacto está limitado a una denegación de servicio (error irrecuperable en el núcleo del sistema, kernel panic) debido a una llamada vm_faultcon una dirección no alineada. • http://alastairs-place.net/2006/11/dmg-vulnerability http://docs.info.apple.com/article.html?artnum=305214 http://kernelfun.blogspot.com/2006/11/more-mokb-20-11-2006-related-news.html http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-20-11-2006.html http://secunia.com/advisories/23012 http://secunia.com/advisories/24479 http://securitytracker.com/id?1017260 http://www.kb.cert.org/vuls/id/367424 http://ww •
CVE-2006-5051 – unsafe GSSAPI signal handler
https://notcve.org/view.php?id=CVE-2006-5051
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free. Condición de carrera en el manejador de señal OpenSSH en versiones anteriores a 4.4 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario si la autenticación GSSAPI está habilitada, a través de vectores no especificados que conducen a una doble liberación. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://lists.freebsd.org/pipermail/freebsd-security/2006-October/004051.html http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2 http://openssh.org/txt/release-4.4 http://secunia.com/advisories& • CWE-415: Double Free •