SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Apple Mail Vendors:   Apple
Apple Mail Buffer Overflow in Sending SMTP via IPv6 May Cause Arbitrary Code Execution
SecurityTracker Alert ID:  1020140
SecurityTracker URL:  http://securitytracker.com/id/1020140
CVE Reference:   CVE-2008-1576   (Links to External Site)
Date:  May 29 2008
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Apple Mail. A remote user may be able to execute arbitrary code on the target system.

When a user sends mail via an SMTP server and using IPv6, Apple Mail does not properly initialize memory and a buffer overflow may occur. Arbitrary code may be executed on the target system. Also, potentially sensitive information may be delivered to message recipients and mail server administrators.

Systems running Mac OS X v10.5 and later are not affected.

Derek Morr of The Pennsylvania State University reported this vulnerability.

Impact:   A remote user may be able to execute arbitrary code on the target system.
Solution:   The vendor has issued a fix as part of Security Update 2008-003 and Mac OS X v10.5.3, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2008-003 or Mac OS X v10.5.3.

For Mac OS X v10.5.2
The download file is named: "MacOSXUpd10.5.3.dmg"
Its SHA-1 digest is: 017ef905e5653b04e2455da261e804a72bf40139

For Mac OS X v10.5 - v10.5.1
The download file is named: "MacOSXUpdCombo10.5.3.dmg"
Its SHA-1 digest is: 69acd7399de25f1548675d660fdf24eb401e3de3

For Mac OS X Server v10.5.2
The download file is named: "MacOSXServerUpd10.5.3.dmg"
Its SHA-1 digest is: 336c9dceca724eab0b8c9db3943be3f9ecf244a4

For Mac OS X Server v10.5 - v10.5.1
The download file is named: "MacOSXServerUpdCombo10.5.3.dmg"
Its SHA-1 digest is: fdb2187d19ce21caecd3c3ba6b6fa6f65c9c3a4f

For Mac OS X v10.4.11 (Intel)
The download file is named: "SecUpd2008-003Intel.dmg"
Its SHA-1 digest is: 8f84d2f757c2fb277b139f72ef501dc894620e97

For Mac OS X v10.4.11 (PowerPC)
The download file is named: "SecUpd2008-003PPC.dmg"
Its SHA-1 digest is: 51e98d988c5bb09d4b1052199d90a9d65af7c8e7

For Mac OS X Server v10.4.11 (Universal)
The download file is named: "SecUpdSrvr2008-003Univ.dmg"
Its SHA-1 digest is: 337a05956b5a6e962b286a91beee9eb217a0175c

For Mac OS X Server v10.4.11 (PowerPC)
The download file is named: "SecUpdSrvr2008-003PPC.dmg"
Its SHA-1 digest is: 94cab2b4e5d26a284c5d91d0fe4dc20b4e9cfc97

The vendor's advisory is available at:

http://support.apple.com/kb/HT1897

Vendor URL:  support.apple.com/kb/HT1897 (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (macOS/OS X)
Underlying OS Comments:  10.4.11; possibly prior versions

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC