ID

VAR-200702-0382


CVE

CVE-2007-0646


TITLE

Kerberos administration daemon may free uninitialized pointers

Trust: 0.8

sources: CERT/CC: VU#831452

DESCRIPTION

Format string vulnerability in iMovie HD 6.0.3, and Safari in Apple Mac OS X 10.4 through 10.4.10, allows remote user-assisted attackers to cause a denial of service (crash) via format string specifiers in a filename, which is not properly handled when calling the NSRunCriticalAlertPanel Apple AppKit function. A vulnerability exists in the Kerberos administration daemon that may allow a remote, unauthenticated user to free uninitialized pointers. Freeing uninitialized pointers corrupts memory in a way that could allow an attacker to execute code. Apple Mac OS X of Help Viewer Applications (Help Viewer , iMovie Such ) Contains a format string vulnerability by improperly handling help files with incorrect filenames.By downloading and opening a specially crafted help file, a third party could crash the application or execute arbitrary code. Multiple products for Mac OS X are prone to multiple remote format-string vulnerabilities. The affected applications include Help Viewer, Safari, iPhoto, and iMovie. Exploiting these issues can allow attacker-supplied data to be written to arbitrary memory locations, which can facilitate the execution of arbitrary machine code with the privileges of a targeted application. Failed exploit attempts will likely crash the application. Help Viewer 3.0.0, Safari 2.0.4, iMovie HD 6.0.3, and iPhoto 6.0.5 are reported affected; other versions may be vulnerable as well. instruction. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Gentoo update for mit-krb5 SECUNIA ADVISORY ID: SA23903 VERIFY ADVISORY: http://secunia.com/advisories/23903/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Gentoo Linux 1.x http://secunia.com/product/339/ DESCRIPTION: Gentoo has issued an update for krb5. This fixes some vulnerabilities, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. For more information: SA23690 SA23696 SOLUTION: Update to "app-crypt/mit-krb5-1.5.2" or later. ORIGINAL ADVISORY: http://www.gentoo.org/security/en/glsa/glsa-200701-21.xml OTHER REFERENCES: SA23690: http://secunia.com/advisories/23690/ SA235696: http://secunia.com/advisories/23696/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2007-0646 // CERT/CC: VU#831452 // JVNDB: JVNDB-2007-000306 // BID: 22326 // VULHUB: VHN-24008 // PACKETSTORM: 53950

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:*

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.9

Trust: 1.0

vendor:applemodel:imoviescope:eqversion:6.0.3

Trust: 1.0

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mit kerberos teammodel: - scope: - version: -

Trust: 0.8

vendor:openpkgmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:rpathmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4 to v10.4.10 version of

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.9

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4 to v10.4.10 version of

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.10

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:iphotoscope:eqversion:6.0.5(316)

Trust: 0.3

vendor:applemodel:imovie hdscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:help viewerscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.4.11

Trust: 0.3

sources: CERT/CC: VU#831452 // BID: 22326 // JVNDB: JVNDB-2007-000306 // CNNVD: CNNVD-200701-575 // NVD: CVE-2007-0646

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0646
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#831452
value: 20.93

Trust: 0.8

NVD: CVE-2007-0646
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200701-575
value: HIGH

Trust: 0.6

VULHUB: VHN-24008
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0646
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24008
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24008 // JVNDB: JVNDB-2007-000306 // CNNVD: CNNVD-200701-575 // NVD: CVE-2007-0646

PROBLEMTYPE DATA

problemtype:CWE-134

Trust: 1.8

sources: JVNDB: JVNDB-2007-000306 // NVD: CVE-2007-0646

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200701-575

TYPE

format string

Trust: 0.6

sources: CNNVD: CNNVD-200701-575

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000306

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-24008

PATCH

title:Security Update 2007-008url:http://docs.info.apple.com/article.html?artnum=307041-en

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-en

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-ja

Trust: 0.8

title:Security Update 2007-008url:http://docs.info.apple.com/article.html?artnum=307041-ja

Trust: 0.8

sources: JVNDB: JVNDB-2007-000306

EXTERNAL IDS

db:BIDid:22326

Trust: 2.8

db:NVDid:CVE-2007-0646

Trust: 2.8

db:USCERTid:TA07-109A

Trust: 2.5

db:SECUNIAid:24966

Trust: 2.5

db:BIDid:26444

Trust: 1.7

db:VUPENid:ADV-2007-1470

Trust: 1.7

db:VUPENid:ADV-2007-3868

Trust: 1.7

db:USCERTid:TA07-319A

Trust: 1.7

db:SECUNIAid:27643

Trust: 1.7

db:SECUNIAid:23903

Trust: 0.9

db:BIDid:21975

Trust: 0.8

db:SECUNIAid:23701

Trust: 0.8

db:SECUNIAid:23706

Trust: 0.8

db:SECUNIAid:23667

Trust: 0.8

db:SECUNIAid:23690

Trust: 0.8

db:SECTRACKid:1017494

Trust: 0.8

db:CERT/CCid:VU#831452

Trust: 0.8

db:USCERTid:SA07-109A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000306

Trust: 0.8

db:CNNVDid:CNNVD-200701-575

Trust: 0.7

db:CERT/CCid:TA07-109A

Trust: 0.6

db:CERT/CCid:TA07-319A

Trust: 0.6

db:APPLEid:APPLE-SA-2007-11-14

Trust: 0.6

db:APPLEid:APPLE-SA-2007-04-19

Trust: 0.6

db:EXPLOIT-DBid:29551

Trust: 0.1

db:SEEBUGid:SSVID-83043

Trust: 0.1

db:VULHUBid:VHN-24008

Trust: 0.1

db:PACKETSTORMid:53950

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24008 // BID: 22326 // PACKETSTORM: 53950 // JVNDB: JVNDB-2007-000306 // CNNVD: CNNVD-200701-575 // NVD: CVE-2007-0646

REFERENCES

url:http://www.securityfocus.com/bid/22326

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta07-109a.html

Trust: 2.5

url:http://secunia.com/advisories/24966

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=305391

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2007/apr/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2007/nov/msg00002.html

Trust: 1.7

url:http://www.securityfocus.com/bid/26444

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta07-319a.html

Trust: 1.7

url:http://docs.info.apple.com/article.html?artnum=307041

Trust: 1.7

url:http://www.digitalmunition.com/moab-30-01-2007.html

Trust: 1.7

url:http://secunia.com/advisories/27643

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/1470

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/1470

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/3868

Trust: 1.1

url:http://secunia.com/advisories/23903/

Trust: 0.9

url:http://secunia.com/advisories/23690/

Trust: 0.9

url:http://web.mit.edu/kerberos/www/advisories/mitkrb5-sa-2006-003-mechglue.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt.asc

Trust: 0.8

url:http://securitytracker.com/alerts/2007/jan/1017494.html

Trust: 0.8

url:http://www.securityfocus.com/bid/21975

Trust: 0.8

url:http://secunia.com/advisories/23706/

Trust: 0.8

url:http://secunia.com/advisories/23701/

Trust: 0.8

url:http://secunia.com/advisories/23667/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0646

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-109a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-109a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0646

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-109a.html

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/3868

Trust: 0.6

url:http://blog.trendmicro.com/chinese-weekend-compromise/

Trust: 0.3

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

url:http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?vname=js_iframe.ad

Trust: 0.3

url:http://www.digitalmunition.com/moab-30-01-2007.html#poc

Trust: 0.3

url:http://www.gentoo.org/security/en/glsa/glsa-200701-21.xml

Trust: 0.1

url:http://secunia.com/advisories/23696/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/product/339/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24008 // BID: 22326 // PACKETSTORM: 53950 // JVNDB: JVNDB-2007-000306 // CNNVD: CNNVD-200701-575 // NVD: CVE-2007-0646

CREDITS

LMH lmh@info-pull.com

Trust: 0.6

sources: CNNVD: CNNVD-200701-575

SOURCES

db:CERT/CCid:VU#831452
db:VULHUBid:VHN-24008
db:BIDid:22326
db:PACKETSTORMid:53950
db:JVNDBid:JVNDB-2007-000306
db:CNNVDid:CNNVD-200701-575
db:NVDid:CVE-2007-0646

LAST UPDATE DATE

2025-09-02T21:07:08.317000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#831452date:2007-05-10T00:00:00
db:VULHUBid:VHN-24008date:2011-03-07T00:00:00
db:BIDid:22326date:2016-07-06T14:40:00
db:JVNDBid:JVNDB-2007-000306date:2007-12-06T00:00:00
db:CNNVDid:CNNVD-200701-575date:2007-08-06T00:00:00
db:NVDid:CVE-2007-0646date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#831452date:2007-01-09T00:00:00
db:VULHUBid:VHN-24008date:2007-02-01T00:00:00
db:BIDid:22326date:2007-01-30T00:00:00
db:PACKETSTORMid:53950date:2007-01-27T01:46:45
db:JVNDBid:JVNDB-2007-000306date:2007-05-17T00:00:00
db:CNNVDid:CNNVD-200701-575date:2007-01-31T00:00:00
db:NVDid:CVE-2007-0646date:2007-02-01T00:28:00