CVE-2006-6173 – Apple Mac OSX 10.4.x - 'Shared_Region_Make_Private_Np' Kernel Function Local Memory Corruption
https://notcve.org/view.php?id=CVE-2006-6173
Buffer overflow in the shared_region_make_private_np function in vm/vm_unix.c in Mac OS X 10.4.6 and earlier allows local users to execute arbitrary code via (1) a small range count, which causes insufficient memory allocation, or (2) a large number of ranges in the shared_region_make_private_np_args parameter. Desbordamiento de búfer en la función shared_region_make_private_np de vm/vm_unix.c de Mac OS X 10.4.6 y versiones anteriores permite a usuarios locales ejecutar código de su elección mediante (1) un contador de rango pequeño, que provoca insuficiencia de reserva de memoria, ó (2) un gran número de rangos en el parámetro shared_region_make_private_np_args. • https://www.exploit-db.com/exploits/29201 http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-28-11-2006.html http://secunia.com/advisories/23120 http://secunia.com/advisories/24479 http://securitytracker.com/id?1017306 http://www.securityfocus.com/bid/21349 http://www.securitytracker.com/id?1017751 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http:& •
CVE-2006-4401
https://notcve.org/view.php?id=CVE-2006-4401
Unspecified vulnerability in CFNetwork in Mac OS 10.4.8 and earlier allows user-assisted remote attackers to execute arbitrary FTP commands via a crafted FTP URI. Vulnerabilidad no especificada en CFNetwork en Mac OS 10.4.8 y versiones anteriores permite a atacantes remotos con la intervención del usuario ejecutar comandos FTP de su elección mediante una URI FTP manipulada. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017302 http://www.kb.cert.org/vuls/id/681056 http://www.osvdb.org/30736 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •
CVE-2006-4406
https://notcve.org/view.php?id=CVE-2006-4406
Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, when PPPoE is enabled, allows remote attackers to execute arbitrary code via unspecified vectors. Desbordamiento de búfer en PPP de Apple Mac OS X 10.4.x hasta 10.4.8 y 10.3.x hasta 10.3.9, cuando PPPoE está habilitado, permite a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://docs.info.apple.com/article.html?artnum=304829 http://labs.musecurity.com/advisories/MU-200611-01.txt http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017305 http://www.kb.cert.org/vuls/id/870960 http://www.osvdb.org/30732 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 https: •
CVE-2006-4403
https://notcve.org/view.php?id=CVE-2006-4403
The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will crash when a login failure occurs with a valid user name, which allows remote attackers to cause a denial of service (crash) and enumerate valid usernames. El servidor FTP en Apple Mac OS X 10.4.8 y anteriores, cuando el acceso FTP está habilitado, sufre una caída cuando ocurre un intento de acceso erróneo con un nombre de usuario válido, lo que permite a atacantes remotos provocar una denegación de servicio (caída) y enumerar nombres de usuario válidos. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017303 http://www.kb.cert.org/vuls/id/371648 http://www.osvdb.org/30734 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 https://exchange.xforce.ibmcloud.com/vulnerabilities/30621 •
CVE-2006-4400
https://notcve.org/view.php?id=CVE-2006-4400
Stack-based buffer overflow in the Apple Type Services (ATS) server in Mac OS 10.4.8 and earlier allow user-assisted attackers to execute arbitrary code via crafted font files. Desbordamiento de búfer basado en pila en el servidor Apple Type Services (ATS) de Mac OS 10.4.8 y anteriores permite a atacantes con la intervención del usuario ejecutar código de su elección mediante archivos de fuentes manipulados. • http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/23155 http://securitytracker.com/id?1017301 http://www.kb.cert.org/vuls/id/835936 http://www.osvdb.org/30737 http://www.securityfocus.com/bid/21335 http://www.us-cert.gov/cas/techalerts/TA06-333A.html http://www.vupen.com/english/advisories/2006/4750 •