CVE-2006-6061
https://notcve.org/view.php?id=CVE-2006-6061
com.apple.AppleDiskImageController in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to execute arbitrary code via a malformed DMG image that triggers memory corruption. NOTE: the severity of this issue has been disputed by a third party, who states that the impact is limited to a denial of service (kernel panic) due to a vm_fault call with a non-aligned address. com.apple.AppleDiskImagecontroller en Apple Mac OS X 10.4.8, y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección mediante una imagen DMG mal formada que provoca una corrupción de memoria. NOTA: la severidad de este asunto ha sido impugnada por una tercera parte, la cual afirma que el impacto está limitado a una denegación de servicio (error irrecuperable en el núcleo del sistema, kernel panic) debido a una llamada vm_faultcon una dirección no alineada. • http://alastairs-place.net/2006/11/dmg-vulnerability http://docs.info.apple.com/article.html?artnum=305214 http://kernelfun.blogspot.com/2006/11/more-mokb-20-11-2006-related-news.html http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://projects.info-pull.com/mokb/MOKB-20-11-2006.html http://secunia.com/advisories/23012 http://secunia.com/advisories/24479 http://securitytracker.com/id?1017260 http://www.kb.cert.org/vuls/id/367424 http://ww •
CVE-2006-5710 – Apple Airport - 802.11 Probe Response Kernel Memory Corruption (PoC)
https://notcve.org/view.php?id=CVE-2006-5710
The Airport driver for certain Orinoco based Airport cards in Darwin kernel 8.8.0 in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to execute arbitrary code via an 802.11 probe response frame without any valid information element (IE) fields after the header, which triggers a heap-based buffer overflow. El controlador Aeropuerto para cierto Orinoco basados en tarjetas de aeropuerto en Darwin kernel 8.8.0 en Apple Mac OS X 10.4.8, y posiblemente otras versiones, permite a un atacante remoto ejecutar código de su elección a través de una vetana de respuesta de prueba 802.11 sin ningún campo elemento de validación de información (IE) después de la cabecera, lo cual dispara un desbordamiento de búfer basado en pila. • https://www.exploit-db.com/exploits/2700 http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://projects.info-pull.com/mokb/MOKB-01-11-2006.html http://secunia.com/advisories/22679 http://secunia.com/advisories/23155 http://securitytracker.com/id?1017151 http://www.kb.cert.org/vuls/id/191336 http://www.osvdb.org/30180 http://www.securityfocus.com/bid/20862 http://www.us-cert.gov/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-4399
https://notcve.org/view.php?id=CVE-2006-4399
User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 appears to allow administrators to change the authentication type from crypt to ShadowHash passwords for accounts in a NetInfo parent, when such an operation is not actually supported, which could result in less secure password management than intended. Inconsistencia de interfaz de usuario en el Administrador de Grupos de Trabajo (Workgroup Manager) en Apple Mac OS X 10.4 hasta 10.4.7 aparece para permitir a los administradores cambiar el tipo de autenticación de contraseñas crypt a ShadowHash para cuentas en un servidor NetInfo padre, cuando dicha operación no está realmente soportada, lo cual podría resultar en una gestión de contraseñas menos segura de lo que se pretendía. • http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html http://secunia.com/advisories/22187 http://securitytracker.com/id?1016958 http://www.kb.cert.org/vuls/id/847468 http://www.osvdb.org/29276 http://www.securityfocus.com/bid/20271 http://www.us-cert.gov/cas/techalerts/TA06-275A.html http://www.vupen.com/english/advisories/2006/3852 https://exchange.xforce.ibmcloud.com/vulnerabilities/29302 •
CVE-2006-4395
https://notcve.org/view.php?id=CVE-2006-4395
Unspecified vulnerability in QuickDraw Manager in Apple Mac OS X 10.3.9 and 10.4 through 10.4.7 allows context-dependent attackers to cause a denial of service ("memory corruption" and crash) via a crafted PICT image that is not properly handled by a certain "unsupported QuickDraw operation." Vulnerabilidad no especificada en Quickdraw Manager en Apple Mac OS X 10.3.9 y 10.4 hasta 10.4.7 permite a atacantes (locales o remotos dependiendo del contexto) provocar una denegación de servicio ("corrupción de memoria" y caída) mediante una imagen PICT creada artesanalmente que no es manejada adecuadamente por una determinada "operación QuickDraw no soportada". • http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html http://secunia.com/advisories/22187 http://securitytracker.com/id?1016956 http://www.kb.cert.org/vuls/id/346396 http://www.osvdb.org/29274 http://www.securityfocus.com/bid/20271 http://www.us-cert.gov/cas/techalerts/TA06-275A.html http://www.vupen.com/english/advisories/2006/3852 https://exchange.xforce.ibmcloud.com/vulnerabilities/29299 •
CVE-2006-4387
https://notcve.org/view.php?id=CVE-2006-4387
Apple Mac OS X 10.4 through 10.4.7, when the administrator clears the "Allow user to administer this computer" checkbox in System Preferences for a user, does not remove the user's account from the appserveradm or appserverusr groups, which still allows the user to manage WebObjects applications. Apple Mac OS X 10.4 hasta la 10.4.7, cuando un administrador quita en la caja de selección "Permitir al usuario administrador su ordenador" en System Preferences para un usuario, no mueve la cuenta de usuario desde los grupos appserveradm o appserverusr, lo cual todavia permite al usuario manejar aplicaciones WebObjects. • http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html http://secunia.com/advisories/22187 http://securitytracker.com/id?1016955 http://www.osvdb.org/29273 http://www.securityfocus.com/bid/20271 http://www.vupen.com/english/advisories/2006/3852 https://exchange.xforce.ibmcloud.com/vulnerabilities/29296 •