ID

VAR-200802-0015


CVE

CVE-2008-0043


TITLE

Apple iPhoto of Photocast Subscription format string vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2008-001060

DESCRIPTION

Format string vulnerability in Apple iPhoto before 7.1.2 allows remote attackers to execute arbitrary code via photocast subscriptions. iPhoto is prone to a format-string vulnerability. Failed attacks will likely cause denial-of-service conditions. This issue affects versions prior to iPhoto 7.1.2. iPhoto is a tool for importing, organizing and sharing digital photos. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Apple iPhoto Photocast Format String Vulnerability SECUNIA ADVISORY ID: SA28805 VERIFY ADVISORY: http://secunia.com/advisories/28805/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Apple iLife iPhoto 7.x http://secunia.com/product/17471/ DESCRIPTION: A vulnerability has been reported in Apple iPhoto, which can be exploited by malicious people to compromise a vulnerable system. SOLUTION: Update to iPhoto 7.1.2. http://www.apple.com/support/downloads/iphoto712.html PROVIDED AND/OR DISCOVERED BY: The vendor credits Nathan McFeters, Ernst & Young's Advanced Security Center. ORIGINAL ADVISORY: http://docs.info.apple.com/article.html?artnum=307398 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-0043 // JVNDB: JVNDB-2008-001060 // BID: 27636 // VULHUB: VHN-30168 // PACKETSTORM: 63350

AFFECTED PRODUCTS

vendor:applemodel:iphotoscope:lteversion:7.1

Trust: 1.0

vendor:applemodel:iphotoscope:eqversion:7.1

Trust: 0.9

vendor:applemodel:iphotoscope:eqversion:‘08 7.1

Trust: 0.8

vendor:applemodel:iphotoscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:iphotoscope:eqversion:6.0.6

Trust: 0.3

vendor:applemodel:iphotoscope:eqversion:6.0.5(316)

Trust: 0.3

sources: BID: 27636 // JVNDB: JVNDB-2008-001060 // CNNVD: CNNVD-200802-104 // NVD: CVE-2008-0043

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0043
value: HIGH

Trust: 1.0

NVD: CVE-2008-0043
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200802-104
value: CRITICAL

Trust: 0.6

VULHUB: VHN-30168
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-0043
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30168
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30168 // JVNDB: JVNDB-2008-001060 // CNNVD: CNNVD-200802-104 // NVD: CVE-2008-0043

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-30168 // JVNDB: JVNDB-2008-001060 // NVD: CVE-2008-0043

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200802-104

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-200802-104

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001060

PATCH

title:iPhoto 7.1.2url:http://docs.info.apple.com/article.html?artnum=307398-en

Trust: 0.8

title:iPhoto 7.1.2url:http://docs.info.apple.com/article.html?artnum=307398-ja

Trust: 0.8

sources: JVNDB: JVNDB-2008-001060

EXTERNAL IDS

db:BIDid:27636

Trust: 2.8

db:NVDid:CVE-2008-0043

Trust: 2.8

db:SECUNIAid:28805

Trust: 2.6

db:SECTRACKid:1019307

Trust: 2.5

db:VUPENid:ADV-2008-0428

Trust: 1.7

db:JVNDBid:JVNDB-2008-001060

Trust: 0.8

db:CNNVDid:CNNVD-200802-104

Trust: 0.7

db:APPLEid:APPLE-SA-2008-02-05

Trust: 0.6

db:VULHUBid:VHN-30168

Trust: 0.1

db:PACKETSTORMid:63350

Trust: 0.1

sources: VULHUB: VHN-30168 // BID: 27636 // JVNDB: JVNDB-2008-001060 // PACKETSTORM: 63350 // CNNVD: CNNVD-200802-104 // NVD: CVE-2008-0043

REFERENCES

url:http://www.securityfocus.com/bid/27636

Trust: 2.5

url:http://www.securitytracker.com/id?1019307

Trust: 2.5

url:http://secunia.com/advisories/28805

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=307398

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2008/feb/msg00000.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/0428/references

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0043

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/0428

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0043

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/0428/references

Trust: 0.6

url:http://www.apple.com/ilife/iphoto/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/17471/

Trust: 0.1

url:http://www.apple.com/support/downloads/iphoto712.html

Trust: 0.1

url:http://secunia.com/advisories/28805/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-30168 // BID: 27636 // JVNDB: JVNDB-2008-001060 // PACKETSTORM: 63350 // CNNVD: CNNVD-200802-104 // NVD: CVE-2008-0043

CREDITS

Nathan McFeters

Trust: 0.6

sources: CNNVD: CNNVD-200802-104

SOURCES

db:VULHUBid:VHN-30168
db:BIDid:27636
db:JVNDBid:JVNDB-2008-001060
db:PACKETSTORMid:63350
db:CNNVDid:CNNVD-200802-104
db:NVDid:CVE-2008-0043

LAST UPDATE DATE

2025-04-10T23:18:05.673000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30168date:2011-03-08T00:00:00
db:BIDid:27636date:2008-02-08T03:36:00
db:JVNDBid:JVNDB-2008-001060date:2008-02-19T00:00:00
db:CNNVDid:CNNVD-200802-104date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0043date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-30168date:2008-02-08T00:00:00
db:BIDid:27636date:2008-02-05T00:00:00
db:JVNDBid:JVNDB-2008-001060date:2008-02-19T00:00:00
db:PACKETSTORMid:63350date:2008-02-07T01:07:33
db:CNNVDid:CNNVD-200802-104date:2008-02-07T00:00:00
db:NVDid:CVE-2008-0043date:2008-02-08T02:00:00