Mac OS X Format String Flaw in c++filt() Lets Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1020392 |
SecurityTracker URL: http://securitytracker.com/id/1020392
|
CVE Reference:
CVE-2008-2310
(Links to External Site)
|
Date: Jun 30 2008
|
Impact:
Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 10.5 through 10.5.3
|
Description:
A vulnerability was reported in Mac OS X. A user can cause arbitrary code to be executed on the target system.
A user can supply a specially crafted string to c++filt() to trigger a format string bug and execute arbitrary code on the target system.
Systems prior to Mac OS X 10.5 are not affected.
|
Impact:
A user can execute arbitrary code on the target system.
|
Solution:
The vendor has issued a fix (Security Update 2008-004 and Mac OS X 10.5.4), which can be downloaded and installed via Software Update preferences, or from Apple Downloads at:
http://www.apple.com/support/downloads/
The vendor's advisory is available at:
http://support.apple.com/kb/HT2163
|
Vendor URL: support.apple.com/kb/HT2163 (Links to External Site)
|
Cause:
Input validation error, State error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|