ID

VAR-200603-0277


CVE

CVE-2006-0389


TITLE

Apple Safari WebKit component vulnerable to buffer overflow

Trust: 0.8

sources: CERT/CC: VU#351217

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Syndication (Safari RSS) in Mac OS X 10.4 through 10.4.5 allows remote attackers to execute arbitrary JavaScript via unspecified vectors involving RSS feeds. Apple Safari is vulnerable to a stack-based buffer overflow. This may allow a remote attacker to execute arbitrary code on a vulnerable system. Apple has released Security Update 2006-001 to address multiple remote and local Mac OS X vulnerabilities. Apple has also released updates to address these issues. There is a directory traversal vulnerability in the implementation of this framework, which allows an attacker to decompress files to any location writable by the current user. If the user is logged on with administrative privileges, the attacker could take complete control of an affected system. Solution Since there is no known patch for this issue at this time, US-CERT is recommending a workaround. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. This can be exploited via a specially crafted email containing an attachment of an ostensibly safe file type (e.g. ".jpg") to execute arbitrary shell commands when the attachment is double-clicked. SOLUTION: Do not open attachments from untrusted sources. 1) Various security issues exist in the PHP Apache module and scripting environment. For more information: SA17371 2) An error in automount makes it possible for malicious file servers to cause a vulnerable system to mount file systems with reserved names, which can cause a DoS (Denial of Service) or potentially allow arbitrary code execution. 3) An input validation error in the BOM framework when unpacking certain archives can be exploited to cause files to be unpacked to arbitrary locations via directory traversal attacks. 4) The "passwd" program creates temporary files insecurely, which can be exploited via symlink attacks to create or overwrite arbitrary files with "root" privileges. 5) User directories are insecurely mounted when a FileVault image is created, which may allow unauthorised access to files. 6) An error in IPSec when handling certain error conditions can be exploited to cause a DoS against VPN connections. 7) An error in the LibSystem component can be exploited by malicious people to cause a heap-based buffer overflow via applications when requesting large amounts of memory. 8) The "Download Validation" in the Mail component fails to warn users about unsafe file types when an e-mail attachment is double-clicked. 9) In certain cases a Perl program may fail to drop privileges. For more information: SA17922 10) A boundary error in rsync can be exploited by authenticated users to cause a heap-based buffer overflow when it's allowed to transfer extended attributes. 11) A boundary error in WebKit's handling of certain HTML can be exploited to cause a heap-based buffer overflow. 12) A boundary error in Safari when parsing JavaScript can be exploited to cause a stack-based buffer overflow and allows execution of arbitrary code when a malicious web page including specially crafted JavaScript is viewed. 13) An error in Safari's security model when handling HTTP redirection can be exploited to execute JavaScript in the local domain via a specially crafted web site. 14) An error in Safari / LaunchServices may cause a malicious application to appear as a safe file type. This may cause a malicious file to be executed automatically when the "Open safe files after downloading" option is enabled. SOLUTION: Apply Security Update 2006-001. Mac OS X 10.4.5 (PPC): http://www.apple.com/support/downloads/securityupdate2006001macosx1045ppc.html Mac OS X 10.4.5 Client (Intel): http://www.apple.com/support/downloads/securityupdate2006001macosx1045clientintel.html Mac OS X 10.3.9 Client: http://www.apple.com/support/downloads/securityupdate20060011039client.html Mac OS X 10.3.9 Server: http://www.apple.com/support/downloads/securityupdate20060011039server.html PROVIDED AND/OR DISCOVERED BY: 3) The vendor credits St\xe9phane Kardas, CERTA. 4) Vade 79 (the vendor also credits Ilja van Sprundel and iDEFENSE). 6) The vendor credits OUSPG from the University of Oulu, NISCC, and CERT-FI. 7) The vendor credits Neil Archibald, Suresec LTD. 10) The vendor credits Jan-Derk Bakker. 11) The vendor credits Suresec LTD. ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=303382 Vade79: http://fakehalo.us/xosx-passwd.pl OTHER REFERENCES: SA18963: http://secunia.com/advisories/18963/ SA17922: http://secunia.com/advisories/17922/ SA17371: http://secunia.com/advisories/17371/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . In certain cases, this may cause the system to become unresponsive. Other applications that use the parser may also be affected. Impacts of other vulnerabilities include bypassing security restrictions and denial of service. I. As further information becomes available, we will publish individual Vulnerability Notes. In addition, more information about VU#999708 is available in US-CERT Technical Cyber Security Alert TA06-053A. II. Impact The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. III. Appendix A. References * US-CERT Vulnerability Note VU#999708 - <http://www.kb.cert.org/vuls/id/999708> * US-CERT Vulnerability Note VU#351217 - <http://www.kb.cert.org/vuls/id/351217> * US-CERT Vulnerability Note VU#176732 - <http://www.kb.cert.org/vuls/id/176732> * US-CERT Technical Cyber Security Alert TA06-053A - <http://www.us-cert.gov/cas/techalerts/TA06-053A.html> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/#Safari> * Apple Security Update 2006-001 - <http://docs.info.apple.com/article.html?artnum=303382> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-062A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-062A Feedback VU#351217" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History March 3, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRAiYnH0pj593lg50AQIdzggAxPbhEKlYyJUdTNqDBGSI+GAQ2oRY9WFx i+2yy5B34IvwyWt04Wb9PxgbCeWHbw9zc8X5xRPZEA/nVQWX/nnz20Tnap8ZRZUC bqlzo9pz2P+TOm3SBKUlZ+Rl0xTUTBJus78oiczzLu/Fy1oB8obC3qfwNDdrykXc i2MupUdRbZ5azrzDmzJGZktpVwJjM9UbXypbwsa1vg5+pAcRf4N0939kcjBML6LH B1jKz3PF0DLX/THj0sAq5PwiE82jCtop1hpD8zVWJOLGX1lbxhcHVLbiFiKaaF7u lKvIAf6ec9h+MQDwAnuA2uaYaQSwofCiWdOPAlueMzq23Ultlinz4g== =5Ooe -----END PGP SIGNATURE-----

Trust: 3.87

sources: NVD: CVE-2006-0389 // CERT/CC: VU#351217 // CERT/CC: VU#433819 // CERT/CC: VU#176732 // BID: 16907 // VULHUB: VHN-16497 // PACKETSTORM: 44162 // PACKETSTORM: 61082 // PACKETSTORM: 44297 // PACKETSTORM: 42522 // PACKETSTORM: 44362

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 2.4

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

sources: CERT/CC: VU#351217 // CERT/CC: VU#433819 // CERT/CC: VU#176732 // BID: 16907 // NVD: CVE-2006-0389 // CNNVD: CNNVD-200603-034

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2006-0389
value: LOW

Trust: 1.0

CARNEGIE MELLON: VU#351217
value: 17.21

Trust: 0.8

CARNEGIE MELLON: VU#433819
value: 9.28

Trust: 0.8

CARNEGIE MELLON: VU#176732
value: 17.21

Trust: 0.8

CNNVD: CNNVD-200603-034
value: LOW

Trust: 0.6

VULHUB: VHN-16497
value: LOW

Trust: 0.1

NVD:
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: TRUE
version: 2.0

Trust: 1.0

VULHUB: VHN-16497
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#351217 // CERT/CC: VU#433819 // CERT/CC: VU#176732 // VULHUB: VHN-16497 // NVD: CVE-2006-0389 // CNNVD: CNNVD-200603-034

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-0389

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 44162 // PACKETSTORM: 44362 // CNNVD: CNNVD-200603-034

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200603-034

CONFIGURATIONS

sources: NVD: CVE-2006-0389

EXTERNAL IDS

db:SECUNIAid:19064

Trust: 3.4

db:USCERTid:TA06-062A

Trust: 2.6

db:BIDid:16907

Trust: 2.0

db:NVDid:CVE-2006-0389

Trust: 2.0

db:OSVDBid:23649

Trust: 1.7

db:VUPENid:ADV-2006-0791

Trust: 1.7

db:SECUNIAid:18220

Trust: 0.9

db:CERT/CCid:VU#351217

Trust: 0.9

db:SECUNIAid:27785

Trust: 0.9

db:CERT/CCid:VU#176732

Trust: 0.9

db:CERT/CCid:VU#433819

Trust: 0.8

db:CNNVDid:CNNVD-200603-034

Trust: 0.7

db:CERT/CCid:TA06-062A

Trust: 0.6

db:APPLEid:APPLE-SA-2006-03-01

Trust: 0.6

db:XFid:25040

Trust: 0.6

db:USCERTid:TA06-053A

Trust: 0.2

db:CERT/CCid:VU#999708

Trust: 0.2

db:VULHUBid:VHN-16497

Trust: 0.1

db:PACKETSTORMid:44162

Trust: 0.1

db:PACKETSTORMid:61082

Trust: 0.1

db:PACKETSTORMid:44297

Trust: 0.1

db:PACKETSTORMid:42522

Trust: 0.1

db:PACKETSTORMid:44362

Trust: 0.1

sources: CERT/CC: VU#351217 // CERT/CC: VU#433819 // CERT/CC: VU#176732 // VULHUB: VHN-16497 // BID: 16907 // PACKETSTORM: 44162 // PACKETSTORM: 61082 // PACKETSTORM: 44297 // PACKETSTORM: 42522 // PACKETSTORM: 44362 // NVD: CVE-2006-0389 // CNNVD: CNNVD-200603-034

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=303382

Trust: 4.2

url:http://www.us-cert.gov/cas/techalerts/ta06-062a.html

Trust: 2.5

url:http://secunia.com/advisories/19064/

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2006/mar/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/16907

Trust: 1.7

url:http://www.osvdb.org/23649

Trust: 1.7

url:http://secunia.com/advisories/19064

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/0791

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/25040

Trust: 1.1

url:http://security-protocols.com/advisory/sp-x22-advisory.txt

Trust: 0.9

url:http://secunia.com/advisories/18220/

Trust: 0.9

url:http://secunia.com/advisories/27785/

Trust: 0.9

url:http://webkit.opendarwin.org/

Trust: 0.8

url:http://www.heise-security.co.uk/news/99257

Trust: 0.8

url:http://www.cert.org/homeusers/email-attachments.html

Trust: 0.8

url:http://www.apple.com/macosx/features/mail.html

Trust: 0.8

url:http://tools.ietf.org/html/rfc1740

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/0791

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/25040

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.suresec.org/advisories/adv11.pdf

Trust: 0.3

url:/archive/1/426586

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/product/96/

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/999708>

Trust: 0.2

url:http://www.us-cert.gov/cas/techalerts/ta06-053a.html>

Trust: 0.2

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.2

url:http://www.us-cert.gov/legal.html>

Trust: 0.2

url:http://www.apple.com/macosx/features/safari/>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/#sgeneral>

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://www.heise-security.co.uk/news/99257

Trust: 0.1

url:http://secunia.com/advisories/17922/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2006001macosx1045clientintel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate20060011039server.html

Trust: 0.1

url:http://secunia.com/advisories/18963/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2006001macosx1045ppc.html

Trust: 0.1

url:http://secunia.com/advisories/17371/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate20060011039client.html

Trust: 0.1

url:http://fakehalo.us/xosx-passwd.pl

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/176732>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-062a.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/351217>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/#safari>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=303382>

Trust: 0.1

sources: CERT/CC: VU#351217 // CERT/CC: VU#433819 // CERT/CC: VU#176732 // VULHUB: VHN-16497 // BID: 16907 // PACKETSTORM: 44162 // PACKETSTORM: 61082 // PACKETSTORM: 44297 // PACKETSTORM: 42522 // PACKETSTORM: 44362 // NVD: CVE-2006-0389 // CNNVD: CNNVD-200603-034

CREDITS

Stéphane Kardas

Trust: 0.6

sources: CNNVD: CNNVD-200603-034

SOURCES

db:CERT/CCid:VU#351217
db:CERT/CCid:VU#433819
db:CERT/CCid:VU#176732
db:VULHUBid:VHN-16497
db:BIDid:16907
db:PACKETSTORMid:44162
db:PACKETSTORMid:61082
db:PACKETSTORMid:44297
db:PACKETSTORMid:42522
db:PACKETSTORMid:44362
db:NVDid:CVE-2006-0389
db:CNNVDid:CNNVD-200603-034

LAST UPDATE DATE

2023-12-18T11:06:20.025000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#351217date:2006-03-06T00:00:00
db:CERT/CCid:VU#433819date:2007-11-27T00:00:00
db:CERT/CCid:VU#176732date:2006-03-03T00:00:00
db:VULHUBid:VHN-16497date:2017-07-20T00:00:00
db:BIDid:16907date:2006-04-11T19:02:00
db:NVDid:CVE-2006-0389date:2017-07-20T01:29:43.377
db:CNNVDid:CNNVD-200603-034date:2006-03-08T00:00:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#351217date:2006-03-03T00:00:00
db:CERT/CCid:VU#433819date:2007-11-27T00:00:00
db:CERT/CCid:VU#176732date:2006-03-03T00:00:00
db:VULHUBid:VHN-16497date:2006-03-03T00:00:00
db:BIDid:16907date:2006-03-01T00:00:00
db:PACKETSTORMid:44162date:2006-02-26T03:08:24
db:PACKETSTORMid:61082date:2007-11-26T16:56:43
db:PACKETSTORMid:44297date:2006-03-02T21:01:19
db:PACKETSTORMid:42522date:2005-12-23T08:37:20
db:PACKETSTORMid:44362date:2006-03-06T09:45:32
db:NVDid:CVE-2006-0389date:2006-03-03T22:02:00
db:CNNVDid:CNNVD-200603-034date:2005-11-14T00:00:00