ID

VAR-200712-0161


CVE

CVE-2007-6276


TITLE

Apple Mac OS X VPND Remote Denial of Service Vulnerability

Trust: 0.9

sources: BID: 26699 // CNNVD: CNNVD-200712-066

DESCRIPTION

The accept_connections function in the virtual private network daemon (vpnd) in Apple Mac OS X 10.5 before 10.5.4 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted load balancing packet to UDP port 4112. An attacker can exploit this issue to crash affected computers, denying service to legitimate users. This issue affects Apple Mac OS X 10.5; other versions may also be affected. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. The vulnerability is caused due to an error within vpnd when handling connections and can be exploited to stop the VPN daemon by sending a specially crafted packet to the service. Other versions may also be affected. SOLUTION: Restrict network access to the VPN daemon to trusted clients. PROVIDED AND/OR DISCOVERED BY: mu-b ORIGINAL ADVISORY: http://milw0rm.com/exploits/4690 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30802 VERIFY ADVISORY: http://secunia.com/advisories/30802/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities and a weakness. 1) An unspecified error in the Alias Manager when handling AFP volume mount information in an alias data structure can be exploited to cause a memory corruption and potentially execute arbitrary code. 2) A weakness is caused due to users not being warned before opening certain potentially unsafe content types, e.g. .xht and .xhtm files. 3) A format string error in c++filt can be exploited to exploited to execute arbitrary code when a specially crafted string is passed to the application. 4) An vulnerability in Dock can be exploited by malicious people with physical access to a system to bypass the screen lock when Expos\xe9 hot corners are set. 5) A race condition error exists in Launch Services in the download validation of symbolic links. This can be exploited to execute arbitrary code when a user visits a malicious web site. Successful exploitation requires that the "Open 'safe' files" option is enabled in Safari. 6) A vulnerability in Net-SNMP can be exploited by malicious people to spoof authenticated SNMPv3 packets. For more information: SA30574 7) Some vulnerabilities in Ruby can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. 8) A vulnerability in SMB File Server can be exploited by malicious people to compromise a vulnerable system. For more information: SA30228 9) It is possible to store malicious files within the User Template directory. This can be exploited to execute arbitrary code with permissions of a new user when his home directory is created using the User Template directory. 10) Some vulnerabilities in Tomcat can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information or to conduct cross-site scripting attacks. For more information: SA25678 SA26466 SA27398 SA28878 11) A vulnerability in WebKit can be exploited by malicious people to compromise a user's system. or apply Security Update 2008-004. Security Update 2008-004 (PPC): http://www.apple.com/support/downloads/securityupdate2008004ppc.html Security Update 2008-004 (Intel): http://www.apple.com/support/downloads/securityupdate2008004intel.html Security Update 2008-004 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008004serverppc.html Security Update 2008-004 Server (Intel): http://www.apple.com/support/downloads/securityupdate2008004serverintel.html Mac OS X 10.5.4 Combo Update: http://www.apple.com/support/downloads/macosx1054comboupdate.html Mac OS X 10.5.4 Update: http://www.apple.com/support/downloads/macosx1054update.html Mac OS X Server 10.5.4: http://www.apple.com/support/downloads/macosxserver1054.html Mac OS X Server Combo 10.5.4: http://www.apple.com/support/downloads/macosxservercombo1054.html PROVIDED AND/OR DISCOVERED BY: The vendor credits: 2) Brian Mastenbrook 4) Andrew Cassell, Marine Spill Response Corporation 8) Alin Rad Pop, Secunia Research 9) Andrew Mortensen, University of Michigan 11) James Urquhart ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT2163 OTHER REFERENCES: SA25678: http://secunia.com/advisories/25678/ SA26466: http://secunia.com/advisories/26466/ SA27398: http://secunia.com/advisories/27398/ SA28878: http://secunia.com/advisories/28878/ SA29232: http://secunia.com/advisories/29232/ SA29794: http://secunia.com/advisories/29794/ SA30228: http://secunia.com/advisories/30228/ SA30574: http://secunia.com/advisories/30574/ SA30775: http://secunia.com/advisories/30775/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2007-6276 // JVNDB: JVNDB-2007-001179 // BID: 26699 // VULHUB: VHN-29638 // PACKETSTORM: 61554 // PACKETSTORM: 67844

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.3

Trust: 1.6

vendor:applemodel:mac os xscope:ltversion:10.5.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:ltversion:10.5.4

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.5.4

Trust: 0.3

sources: BID: 26699 // JVNDB: JVNDB-2007-001179 // CNNVD: CNNVD-200712-066 // NVD: CVE-2007-6276

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6276
value: HIGH

Trust: 1.0

NVD: CVE-2007-6276
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200712-066
value: HIGH

Trust: 0.6

VULHUB: VHN-29638
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-6276
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-29638
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-29638 // JVNDB: JVNDB-2007-001179 // CNNVD: CNNVD-200712-066 // NVD: CVE-2007-6276

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-29638 // JVNDB: JVNDB-2007-001179 // NVD: CVE-2007-6276

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200712-066

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-200712-066

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001179

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-29638

PATCH

title:Security Update 2008-004url:http://support.apple.com/kb/HT2163

Trust: 0.8

title:Security Update 2008-004url:http://support.apple.com/kb/HT2163?viewlocale=ja_JP&locale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2007-001179

EXTERNAL IDS

db:NVDid:CVE-2007-6276

Trust: 2.8

db:BIDid:26699

Trust: 2.8

db:SECUNIAid:27938

Trust: 2.7

db:SECTRACKid:1019052

Trust: 2.5

db:SECUNIAid:30802

Trust: 1.8

db:EXPLOIT-DBid:4690

Trust: 1.8

db:VUPENid:ADV-2007-4145

Trust: 1.7

db:VUPENid:ADV-2008-1981

Trust: 1.7

db:XFid:38855

Trust: 1.4

db:JVNDBid:JVNDB-2007-001179

Trust: 0.8

db:NSFOCUSid:11252

Trust: 0.6

db:MILW0RMid:4690

Trust: 0.6

db:APPLEid:APPLE-SA-2008-06-30

Trust: 0.6

db:CNNVDid:CNNVD-200712-066

Trust: 0.6

db:VULHUBid:VHN-29638

Trust: 0.1

db:PACKETSTORMid:61554

Trust: 0.1

db:PACKETSTORMid:67844

Trust: 0.1

sources: VULHUB: VHN-29638 // BID: 26699 // JVNDB: JVNDB-2007-001179 // PACKETSTORM: 61554 // PACKETSTORM: 67844 // CNNVD: CNNVD-200712-066 // NVD: CVE-2007-6276

REFERENCES

url:http://www.securityfocus.com/bid/26699

Trust: 2.5

url:http://www.securitytracker.com/id?1019052

Trust: 2.5

url:http://secunia.com/advisories/27938

Trust: 2.5

url:http://support.apple.com/kb/ht2163

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2008//jun/msg00002.html

Trust: 1.7

url:http://secunia.com/advisories/30802

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/4145

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/38855

Trust: 1.4

url:https://www.exploit-db.com/exploits/4690

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/4145

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/1981/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38855

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6276

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-6276

Trust: 0.8

url:http://www.milw0rm.com/exploits/4690

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1981/references

Trust: 0.6

url:http://www.nsfocus.net/vulndb/11252

Trust: 0.6

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/product/96/

Trust: 0.2

url:http://secunia.com/advisories/27938/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://milw0rm.com/exploits/4690

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004serverppc.html

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004intel.html

Trust: 0.1

url:http://secunia.com/advisories/30574/

Trust: 0.1

url:http://secunia.com/advisories/29794/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004ppc.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1054update.html

Trust: 0.1

url:http://secunia.com/advisories/27398/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxservercombo1054.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004serverintel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1054comboupdate.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1054.html

Trust: 0.1

url:http://secunia.com/advisories/30802/

Trust: 0.1

url:http://secunia.com/advisories/29232/

Trust: 0.1

url:http://secunia.com/advisories/25678/

Trust: 0.1

url:http://secunia.com/advisories/28878/

Trust: 0.1

url:http://secunia.com/advisories/30775/

Trust: 0.1

url:http://secunia.com/advisories/26466/

Trust: 0.1

url:http://secunia.com/advisories/30228/

Trust: 0.1

sources: VULHUB: VHN-29638 // BID: 26699 // JVNDB: JVNDB-2007-001179 // PACKETSTORM: 61554 // PACKETSTORM: 67844 // CNNVD: CNNVD-200712-066 // NVD: CVE-2007-6276

CREDITS

mu-b mu-b@digit-labs.org

Trust: 0.6

sources: CNNVD: CNNVD-200712-066

SOURCES

db:VULHUBid:VHN-29638
db:BIDid:26699
db:JVNDBid:JVNDB-2007-001179
db:PACKETSTORMid:61554
db:PACKETSTORMid:67844
db:CNNVDid:CNNVD-200712-066
db:NVDid:CVE-2007-6276

LAST UPDATE DATE

2025-04-10T21:06:51.511000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-29638date:2017-09-29T00:00:00
db:BIDid:26699date:2008-07-02T20:30:00
db:JVNDBid:JVNDB-2007-001179date:2008-07-24T00:00:00
db:CNNVDid:CNNVD-200712-066date:2008-12-23T00:00:00
db:NVDid:CVE-2007-6276date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-29638date:2007-12-07T00:00:00
db:BIDid:26699date:2007-12-04T00:00:00
db:JVNDBid:JVNDB-2007-001179date:2008-07-24T00:00:00
db:PACKETSTORMid:61554date:2007-12-07T16:22:07
db:PACKETSTORMid:67844date:2008-07-02T17:42:37
db:CNNVDid:CNNVD-200712-066date:2007-12-07T00:00:00
db:NVDid:CVE-2007-6276date:2007-12-07T11:46:00