ID

VAR-200711-0248


CVE

CVE-2007-4267


TITLE

Apple Mac OS X CoreText uninitialized pointer vulnerability

Trust: 0.8

sources: CERT/CC: VU#498105

DESCRIPTION

Stack-based buffer overflow in the Networking component in Apple Mac OS X 10.4 through 10.4.10 allows local users to execute arbitrary code via a crafted IOCTL request that adds an AppleTalk zone to a routing table. Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications, including AppleRAID, CFFTP, CFNetwork, CoreFoundation, CoreText, kernel, remote_cmds, networking, NFS, NSURL, SecurityAgent, WebCore, and WebKit. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. Apple Mac OS X 10.4.10 and prior versions are vulnerable to these issues. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. 1) Multiple errors within the Adobe Flash Player plug-in can be exploited by malicious people to gain knowledge of sensitive information or compromise a user's system. For more information: SA26027 2) A null-pointer dereference error exists within AppleRAID when handling disk images. This can be exploited to cause a system shutdown when a specially crafted disk image is mounted e.g. automatically via Safari if the option "Open 'safe' files after downloading" is enabled. 3) An error in BIND can be exploited by malicious people to poison the DNS cache. For more information: SA26152 4) An error in bzip2 can be exploited to cause a DoS (Denial of Service). For more information: SA15447 This also fixes a race condition when setting file permissions. 5) An unspecified error in the implementation of FTP of CFNetwork can be exploited by a malicious FTP server to cause the client to connect to other hosts by sending specially crafted replies to FTP PASV (passive) commands. 6) An unspecified error exists in the validation of certificates within CFNetwork. This can be exploited via a Man-in-the-Middle (MitM) attack to spoof a web site with a trusted certificate. 7) A null pointer dereference error in the CFNetwork framework can lead to an unexpected application termination when a vulnerable application connects to a malicious server. 8) A boundary error in CoreFoundation can be exploited to cause a one-byte buffer overflow when a user is enticed to read a specially crafted directory hierarchy. Successful exploitation allows execution of arbitrary code. 9) An error exists in CoreText due to the use of an uninitialised pointer and can be exploited to execute arbitrary code when a user is tricked into reading a specially crafted text. 10) Some vulnerabilities in Kerberos can be exploited by malicious users and malicious people to compromise a vulnerable system. For more information: SA26676 11) An error in the handling of the current Mach thread port or thread exception port in the Kernel can be exploited by a malicious, local user to execute arbitrary code with root privileges. Successful exploitation requires permission to execute a setuid binary. 12) An unspecified error in the Kernel can be exploited to bypass the chroot mechanism by changing the working directory using a relative path. 14) An error exists in the handling of standard file descriptors while executing setuid and setgid programs. This can be exploited by malicious, local users to gain system privileges by executing setuid programs with the standard file descriptors in an unexpected state. 15) An integer overflow exists in the Kernel when handling ioctl requests. This can be exploited to execute arbitrary code with system privileges by sending a specially crafted ioctl request. 16) The default configuration of tftpd allows clients to access any path on the system. 17) An error in the Node Information Query mechanism may allow a remote user to query for all addresses of a host, including link-local addresses. 18) An integer overflow exists in the handling of ASP messages with AppleTalk. 20) A boundary error exists when adding a new AppleTalk zone. 21) An arithmetic error exists in AppleTalk when handling memory allocations. 22) A double free error in NFS exists when processing an AUTH_UNIX RPC call. This can be exploited by malicious people to execute arbitrary code by sending a maliciously crafted AUTH_UNIX RPC call via TCP or UDP. 23) An unspecified case-sensitivity error exists in NSURL when determining if a URL references the local file system. 24) A format string error in Safari can be exploited by malicious people to execute arbitrary code when a user is tricked into opening a .download file with a specially crafted name. 25) An implementation error exists in the tabbed browsing feature of Safari. If HTTP authentication is used by a site being loaded in a tab other than the active tab, an authentication sheet may be displayed although the tab and its corresponding page are not visible. 26) A person with physical access to a system may be able to bypass the screen saver authentication dialog by sending keystrokes to a process running behind the screen saver authentication dialog. 27) Safari does not block "file://" URLs when loading resources. This can be exploited to view the content of local files by enticing a user to visit a specially crafted web page. 28) An input validation error exists in WebCore when handling HTML forms. This can be exploited to alter the values of form fields by enticing a user to upload a specially crafted file. 29) A race condition error exists in Safari when handling page transitions. This can be exploited to obtain information entered in forms on other web sites by enticing a user to visit a malicious web page. 30) An unspecified error exists in the handling of the browser's history. This can be exploited to execute arbitrary code by enticing a user to visit a specially crafted web page. 31) An error in Safari allows malicious websites to set Javascript window properties of websites served from a different domain. This can be exploited to get or set the window status and location of pages served from other websites by enticing a user to visit a specially crafted web page. 32) An error in Safari allows a malicious website to bypass the same origin policy by hosting embedded objects with javascript URLs. This can be exploited to execute arbitrary HTML and script code in context of another site by enticing a user to visit a specially crafted web page. 33) An error in Safari allows content served over HTTP to alter or access content served over HTTPS in the same domain. This can be exploited to execute Javascript code in context of HTTPS web pages in that domain when a user visits a malicious web page. 34) An error in Safari in the handling of new browser windows can be exploited to disclose the URL of an unrelated page. For more information see vulnerability #2 in: SA23893 35) An error in WebKit may allow unauthorised applications to access private keys added to the keychain by Safari. 36) An unspecified error in Safari may allow a malicious website to send remotely specified data to arbitrary TCP ports. 37) WebKit/Safari creates temporary files insecurely when previewing a PDF file, which may allow a local user to access the file's content. 5) The vendor credits Dr Bob Lopez PhD. 6) The vendor credits Marko Karppinen, Petteri Kamppuri, and Nikita Zhuk of MK&C. 9) Will Dormann, CERT/CC 11) An anonymous person, reported via iDefense Labs. 12) The vendor credits Johan Henselmans and Jesper Skov. 13) The vendor credits RISE Security. 14) The vendor credits Ilja van Sprundel. 15) The vendor credits Tobias Klein, www.trapkit.de 16) The vendor credits James P. Javery, Stratus Data Systems 17) The vendor credits Arnaud Ebalard, EADS Innovation Works. 18, 21) Sean Larsson, iDefense Labs 19) The vendor credits Bhavesh Davda of VMware and Brian "chort" Keefer of Tumbleweed Communications. 20) An anonymous person, reported via iDefense Labs. 22) The vendor credits Alan Newson of NGSSoftware, and Renaud Deraison of Tenable Network Security, Inc. 25) The vendor credits Michael Roitzsch, Technical University Dresden. 26) The vendor credits Faisal N. Jawdat 27) The vendor credits lixlpixel. 28) The vendor credits Bodo Ruskamp, Itchigo Communications GmbH. 29) The vendor credits Ryan Grisso, NetSuite. 30) The vendor credits David Bloom. 31, 32) The vendor credits Michal Zalewski, Google Inc. 33) The vendor credits Keigo Yamazaki of LAC Co. 36) The vendor credits Kostas G. Anagnostakis, Institute for Infocomm Research and Spiros Antonatos, FORTH-ICS 37) The vendor credits Jean-Luc Giraud, and Moritz Borgmann of ETH Zurich. ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307041 US-CERT VU#498105: http://www.kb.cert.org/vuls/id/498105 iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=629 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=627 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=628 OTHER REFERENCES: SA15447: http://secunia.com/advisories/15447/ SA23893: http://secunia.com/advisories/23893/ SA26027: http://secunia.com/advisories/26027/ SA26152: http://secunia.com/advisories/26152/ SA26676: http://secunia.com/advisories/26676/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . I. Further details are available in the related vulnerability notes. Impact The impacts of these vulnerabilities vary. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service. This and other updates are available via Apple Update or via Apple Downloads. Please send email to <cert@cert.org> with "TA07-319A Feedback VU#498105" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History November 15, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRzx7ZvRFkHkM87XOAQJfIQgAmTZfjJAY/QTweUmvZtOJ9JQ4e/Gj0sE9 OPSrK/SplP92WUL1Ucb8I/VUSQEXXJhNv9dTCMcy7IMpqhx4UxPA6fBKWDJ+nUFi sx/60EOAiIVW+yYK79VdoI1jrSs48E+CNdqEJCQcjUCVi29eGAdW63H2jOZV37/F 4iQBZYRqhiycZ9FS+S+9aRfMhfy8dEOr1UwIElq6X/tSwss1EKFSNrK5ktGifUtB AJ+LJVBt2yZOIApcGhsxC3LYUDrDfhqGLIVM2XBc1yuV7Y2gaH4g9Txe+fWK79X2 LYHvhv2xtgLweR12YC+0hT60wSdrDTM6ZW0//ny25LZ7Y7D46ogSWQ== =AgEr -----END PGP SIGNATURE----- . BACKGROUND AppleTalk, a set of networking protocols developed by Apple, was originally implemented on early Mac operating systems. AppleTalk is compiled into the default kernel, but must be turned on in order to be used. More information can be found at the following URL. http://docs.info.apple.com/article.html?artnum=50039 II. A zone can be thought of as something similar to a Windows Domain. When copying the user provided zone information into a fixed size stack buffer, the kernel uses a user provided length as the number of bytes to copy into the destination buffer. This results in an exploitable stack buffer overflow in the kernel. III. Unsuccessful attempts will likely crash the system. In order to exploit this vulnerability, the system needs to have AppleTalk configured in routing mode. This is not enabled by default. It would likely be enabled on a Mac system running on a network with legacy Mac hosts. IV. Previous versions may also be affected. To determine if AppleTalk is running, the following command can be executed on the command line. $ appletalk -s V. WORKAROUND Disabling AppleTalk will prevent exploitation of this vulnerability. Executing the following command will disable AppleTalk if it is enabled. # appletalk -d VI. More information is available at the following URL. http://docs.info.apple.com/article.html?artnum=307041 VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-4267 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 08/08/2007 Initial vendor notification 08/09/2007 Initial vendor response 11/14/2007 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 3.06

sources: NVD: CVE-2007-4267 // CERT/CC: VU#498105 // JVNDB: JVNDB-2007-000954 // BID: 26444 // VULHUB: VHN-27629 // VULMON: CVE-2007-4267 // PACKETSTORM: 60958 // PACKETSTORM: 60987 // PACKETSTORM: 60933

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.10

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4 to v10.4.10 version

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4 to v10.4.10 version

Trust: 0.8

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.1x86-64

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.1x86

Trust: 0.3

vendor:s u s emodel:linux ppcscope:eqversion:10.1

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.0x86-64

Trust: 0.3

vendor:s u s emodel:linuxscope:eqversion:10.0x86

Trust: 0.3

vendor:s u s emodel:linux ppcscope:eqversion:10.0

Trust: 0.3

vendor:novellmodel:linux posscope:eqversion:9

Trust: 0.3

vendor:novellmodel:linux desktopscope:eqversion:9

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:safariscope:neversion:3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.4.11

Trust: 0.3

sources: CERT/CC: VU#498105 // BID: 26444 // JVNDB: JVNDB-2007-000954 // CNNVD: CNNVD-200711-221 // NVD: CVE-2007-4267

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4267
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#498105
value: 7.76

Trust: 0.8

NVD: CVE-2007-4267
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200711-221
value: HIGH

Trust: 0.6

VULHUB: VHN-27629
value: HIGH

Trust: 0.1

VULMON: CVE-2007-4267
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4267
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-27629
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#498105 // VULHUB: VHN-27629 // VULMON: CVE-2007-4267 // JVNDB: JVNDB-2007-000954 // CNNVD: CNNVD-200711-221 // NVD: CVE-2007-4267

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-27629 // JVNDB: JVNDB-2007-000954 // NVD: CVE-2007-4267

THREAT TYPE

local

Trust: 0.7

sources: PACKETSTORM: 60933 // CNNVD: CNNVD-200711-221

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200711-221

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000954

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27629

PATCH

title:Security Update 2007-008url:http://docs.info.apple.com/article.html?artnum=307041-en

Trust: 0.8

title:Security Update 2007-008url:http://docs.info.apple.com/article.html?artnum=307041-ja

Trust: 0.8

title:TA07-319Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta07-319a.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000954

EXTERNAL IDS

db:SECUNIAid:27643

Trust: 3.6

db:NVDid:CVE-2007-4267

Trust: 3.0

db:BIDid:26444

Trust: 2.9

db:USCERTid:TA07-319A

Trust: 2.7

db:SECTRACKid:1018950

Trust: 2.6

db:VUPENid:ADV-2007-3868

Trust: 1.8

db:XFid:38475

Trust: 1.4

db:CERT/CCid:VU#498105

Trust: 1.2

db:USCERTid:SA07-319A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000954

Trust: 0.8

db:IDEFENSEid:20071114 APPLE MAC OS X APPLETALK SOCKET IOCTL KERNEL STACK BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:APPLEid:APPLE-SA-2007-11-14

Trust: 0.6

db:CERT/CCid:TA07-319A

Trust: 0.6

db:CNNVDid:CNNVD-200711-221

Trust: 0.6

db:PACKETSTORMid:60933

Trust: 0.2

db:VULHUBid:VHN-27629

Trust: 0.1

db:VULMONid:CVE-2007-4267

Trust: 0.1

db:PACKETSTORMid:60958

Trust: 0.1

db:PACKETSTORMid:60987

Trust: 0.1

sources: CERT/CC: VU#498105 // VULHUB: VHN-27629 // VULMON: CVE-2007-4267 // BID: 26444 // JVNDB: JVNDB-2007-000954 // PACKETSTORM: 60958 // PACKETSTORM: 60987 // PACKETSTORM: 60933 // CNNVD: CNNVD-200711-221 // NVD: CVE-2007-4267

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=307041

Trust: 3.1

url:http://www.securityfocus.com/bid/26444

Trust: 2.6

url:http://www.us-cert.gov/cas/techalerts/ta07-319a.html

Trust: 2.6

url:http://securitytracker.com/id?1018950

Trust: 2.6

url:http://secunia.com/advisories/27643

Trust: 2.6

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=627

Trust: 2.2

url:http://lists.apple.com/archives/security-announce/2007/nov/msg00002.html

Trust: 1.8

url:http://www.frsirt.com/english/advisories/2007/3868

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/38475

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/3868

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38475

Trust: 1.2

url:http://secunia.com/advisories/27643/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4267

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-319a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-319a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4267

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-319a.html

Trust: 0.8

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=629

Trust: 0.4

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=628

Trust: 0.4

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630

Trust: 0.4

url:http://www.kb.cert.org/vuls/id/498105

Trust: 0.4

url:http://www.trapkit.de/advisories/tkadv2007-001.txt

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:/archive/1/483793

Trust: 0.3

url:/archive/1/483753

Trust: 0.3

url:/archive/1/483735

Trust: 0.3

url:/archive/1/483736

Trust: 0.3

url:/archive/1/483738

Trust: 0.3

url:/archive/1/483737

Trust: 0.3

url:http://docs.info.apple.com/article.html?artnum=307563

Trust: 0.3

url:http://risesecurity.org/advisory/rise-2007004/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=14525

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/26027/

Trust: 0.1

url:https://www.trapkit.de

Trust: 0.1

url:http://secunia.com/advisories/23893/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx10411comboupdateppc.html

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver10411comboupdateppc.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver10411updateppc.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx10411comboupdateintel.html

Trust: 0.1

url:http://secunia.com/advisories/26676/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx10411updateintel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver10411comboupdateuniversal.html

Trust: 0.1

url:http://secunia.com/advisories/15447/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx10411updateppc.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate20070081039server.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/26152/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate20070081039client.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://www.isc.org/sw/bind/>

Trust: 0.1

url:http://www.adobe.com/products/flashplayer/>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta07-319a.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple_2007_008>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=307041>

Trust: 0.1

url:http://www.bzip.org/>

Trust: 0.1

url:http://web.mit.edu/kerberos/>

Trust: 0.1

url:http://www.apple.com/support/downloads/>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-4267

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=50039

Trust: 0.1

sources: CERT/CC: VU#498105 // VULHUB: VHN-27629 // VULMON: CVE-2007-4267 // BID: 26444 // JVNDB: JVNDB-2007-000954 // PACKETSTORM: 60958 // PACKETSTORM: 60987 // PACKETSTORM: 60933 // CNNVD: CNNVD-200711-221 // NVD: CVE-2007-4267

CREDITS

iDEFENSE

Trust: 0.6

sources: CNNVD: CNNVD-200711-221

SOURCES

db:CERT/CCid:VU#498105
db:VULHUBid:VHN-27629
db:VULMONid:CVE-2007-4267
db:BIDid:26444
db:JVNDBid:JVNDB-2007-000954
db:PACKETSTORMid:60958
db:PACKETSTORMid:60987
db:PACKETSTORMid:60933
db:CNNVDid:CNNVD-200711-221
db:NVDid:CVE-2007-4267

LAST UPDATE DATE

2025-04-10T22:43:24.302000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#498105date:2007-11-15T00:00:00
db:VULHUBid:VHN-27629date:2017-07-29T00:00:00
db:VULMONid:CVE-2007-4267date:2017-07-29T00:00:00
db:BIDid:26444date:2016-07-05T21:38:00
db:JVNDBid:JVNDB-2007-000954date:2007-12-04T00:00:00
db:CNNVDid:CNNVD-200711-221date:2007-11-15T00:00:00
db:NVDid:CVE-2007-4267date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#498105date:2007-11-14T00:00:00
db:VULHUBid:VHN-27629date:2007-11-15T00:00:00
db:VULMONid:CVE-2007-4267date:2007-11-15T00:00:00
db:BIDid:26444date:2007-11-14T00:00:00
db:JVNDBid:JVNDB-2007-000954date:2007-12-04T00:00:00
db:PACKETSTORMid:60958date:2007-11-16T07:06:08
db:PACKETSTORMid:60987date:2007-11-16T07:24:07
db:PACKETSTORMid:60933date:2007-11-15T02:19:25
db:CNNVDid:CNNVD-200711-221date:2007-11-14T00:00:00
db:NVDid:CVE-2007-4267date:2007-11-15T01:46:00