CVE-2007-0613 – Apple iChat Bonjour 3.1.6.441 - Multiple Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-0613
The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 does not check for duplicate entries when adding newly discovered available contacts, which allows remote attackers to cause a denial of service (disrupted communication) via a flood of duplicate _presence._tcp mDNS queries. La funcionalidad Bonjour en el mDNSResponder, iChat 3.1.6 y InstantMessage framework 428 en el Apple Mac OS X 10.4.8 no chequea entradas duplicadas cuando se añaden contactos disponibles recién descubiertos, lo que permite a atacantes remotos provocar una denegación de servicio (interrumpir la comunicación) mediante una avalancha de consultas duplicate _presence._tcp mDNS. • https://www.exploit-db.com/exploits/3230 http://projects.info-pull.com/moab/MOAB-29-01-2007.html http://www.osvdb.org/32698 http://www.osvdb.org/32699 http://www.securityfocus.com/bid/22304 •
CVE-2007-0614 – Apple iChat Bonjour 3.1.6.441 - Multiple Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-0614
The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 allows remote attackers to cause a denial of service (persistent application crash) via a crafted phsh hash attribute in a TXT key. La funcionalidad Bonjour en el mDNSResponder, iChat 3.1.6 y InstantMessage framework 428 en Apple Mac OS X 10.4.8 permite a atacantes remotos provocar una denegación de servicio (caída continua de la aplicación) mediante la manipulación del atributo phsh hash en la clave de un TXT. • https://www.exploit-db.com/exploits/3230 http://docs.info.apple.com/article.html?artnum=305102 http://lists.apple.com/archives/Security-announce/2007/Feb/msg00000.html http://projects.info-pull.com/moab/MOAB-29-01-2007.html http://secunia.com/advisories/23945 http://secunia.com/advisories/24198 http://www.osvdb.org/32713 http://www.securityfocus.com/bid/22304 http://www.securitytracker.com/id?1017661 •
CVE-2007-0021 – Apple iChat 3.1.6 441 - 'aim://' URL Handler Format String (PoC)
https://notcve.org/view.php?id=CVE-2007-0021
Format string vulnerability in Apple iChat 3.1.6 allows remote attackers to cause a denial of service (null pointer dereference and application crash) and possibly execute arbitrary code via format string specifiers in an aim:// URI. Vulnerabilidad de cadena de formato en Apple iChat 3.1.6 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo y cierre de aplicación) y posiblemente ejecutar código de su elección mediante especificadores de cadena de formato en un URI aim://. • https://www.exploit-db.com/exploits/3166 http://docs.info.apple.com/article.html?artnum=305102 http://lists.apple.com/archives/Security-announce/2007/Feb/msg00000.html http://osvdb.org/32715 http://projects.info-pull.com/moab/MOAB-20-01-2007.html http://secunia.com/advisories/24198 http://www.kb.cert.org/vuls/id/794752 http://www.securityfocus.com/bid/22146 http://www.securitytracker.com/id?1017661 http://www.us-cert.gov/cas/techalerts/TA07-047A.html http:/ •
CVE-2004-0873
https://notcve.org/view.php?id=CVE-2004-0873
Apple iChat AV 2.1, AV 2.0, and 1.0.1 allows remote attackers to execute arbitrary programs via a "link" that references the program. • http://lists.apple.com/archives/security-announce/2004/Sep/msg00001.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17420 •
CVE-1999-0897
https://notcve.org/view.php?id=CVE-1999-0897
iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) attack. • http://marc.info/?l=bugtraq&m=90538488231977&w=2 •