ID

VAR-200805-0578


CVE

CVE-2008-1575


TITLE

Apple Mac OS X of Apple Type Services (ATS) Vulnerability in arbitrary code execution on server

Trust: 0.8

sources: JVNDB: JVNDB-2008-001397

DESCRIPTION

Unspecified vulnerability in the Apple Type Services (ATS) server in Apple Mac OS X 10.5 before 10.5.3 allows user-assisted remote attackers to execute arbitrary code via a crafted embedded font in a PDF document, related to memory corruption that occurs during printing. The security update addresses a total of 19 new vulnerabilities that affect the AFP Server, AppKit, Apple Pixlet Video, ATS, CFNetwork, CoreFoundation, CoreGraphics, CoreTypes, CUPS, Help Viewer, iCal, International Components for Unicode, Image Capture, ImageIO, Kernel, Mail, Single Sign-On, and Wiki Server components of Mac OS X. Successful exploits will allow attackers to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects Mac OS X 10.5 - 10.5.2 and Mac OS X Server 10.5 - 10.5.2. NOTE: This issue was previously covered in BID 29412 (Apple Mac OS X 2008-003 Multiple Security Vulnerabilities) but has been given its own record to better document the vulnerability. This vulnerability is related to the printing process. related to memory corruption. I. Further details are available in the US-CERT Vulnerability Notes Database. II. III. These and other updates are available via Software Update or via Apple Downloads. IV. Please send email to <cert@cert.org> with "TA08-150A Feedback VU#566875" in the subject. _________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. _________________________________________________________________ Produced 2008 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History May 29 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBSD8M8XIHljM+H4irAQL8gggAhPXOm6pPXxrZpjiJYHmlhwCCIclyj9vo Yvs/cicI8vJ3vB4xkUd51/iFoze6D3mFnSxwVAgrixysdkaCxBUyWqmRumEDTXfx 403FR2yIFpSFr7+9VXXWpmq6E0aHVjrKPOArq5uysuIPOHiEbKUisT2gBXUlPrtN RjUg/w/9/IEryPxv/nVzHMcLDde2OLyoo+tiSCOqJK/sC/VUM/d1zkdIDOfu0zom vmqM10hDyA7VR2rgkKvSbqXOWHua0t4eHaNMP0h3N51yLmFhMHxBGj9zWXj9dpHI DcQ9gnQKm7YocOfLC4IPV0BWuPoAkNOEAPeRapPgmJ60icjOpn/MTQ== =QvSr -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. 1) An error in AFP server allows connected users or guests to access files and directories that are not within a shared directory. 2) Some vulnerabilities in Apache can be exploited by malicious people to conduct cross-site scripting attacks or to cause a DoS (Denial of Service). 3) An unspecified error in AppKit can potentially be exploited to execute arbitrary code when a user opens a specially crafted document file with an editor that uses AppKit (e.g. TextEdit). 4) Multiple unspecified errors exist in the processing of Pixlet video files. These can be exploited to cause memory corruption and potentially allow for execution of arbitrary code when a user opens a specially crafted movie file. This can be exploited to cause a memory corruption when a PDF file containing a specially crafted embedded font is printed. 6) An error in Safari's SSL client certificate handling can lead to an information disclosure of the first client certificate found in the keychain when a web server issues a client certificate request. 7) An integer overflow exists in CoreFoundation when handling CFData objects. This can be exploited to cause a heap-based buffer overflow if an application calls "CFDataReplaceBytes" with an invalid "length" argument. 8) An error due to an uninitialised variable in CoreGraphics can potentially be exploited to execute arbitrary code when a specially crafted PDF is opened. 9) A weakness is caused due to users not being warned before opening certain potentially unsafe content types. 10) An error when printing to password-protected printers with debug logging enabled may lead to the disclosure of sensitive information. 11) Some vulnerabilities in Adobe Flash Player can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or to potentially compromise a user's system. For more information: SA28083 12) An integer underflow error in Help Viewer when handling help:topic URLs can be exploited to cause a buffer overflow when a specially crafted help:topic URL is accessed. 13) A conversion error exists in ICU when handling certain character encodings. This can potentially be exploited bypass content filters and may lead to cross-site scripting and disclosure of sensitive information. 14) Input passed to unspecified parameters in Image Capture's embedded web server is not properly sanitised before being used. This can be exploited to disclose the content of local files via directory traversal attacks. 15) An error in the handling of temporary files in Image Capture can be exploited by malicious, local users to manipulate files with the privilege of a user running Image Capture. 16) A boundary error in the BMP and GIF image decoding engine in ImageIO can be exploited to disclose content in memory. 17) Some vulnerabilities in ImageIO can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerabilities are caused due to the use of vulnerable libpng code. For more information: SA27093 SA27130 18) An integer overflow error in ImageIO within the processing of JPEG2000 images can be exploited to cause a heap-based buffer overflow when a specially crafted JPEG2000 image is viewed. 19) An error in Mail is caused due to an uninitialised variable and can lead to disclosure of sensitive information and potentially execution of arbitrary code when mail is sent through an SMTP server over IPv6. 20) A vulnerability in Mongrel can be exploited by malicious people to disclose sensitive information. For more information: SA28323 21) The sso_util command-line tool requires that passwords be passed to it in its arguments, which can be exploited by malicious, local users to disclose the passwords. 22) An error in Wiki Server can be exploited to determine valid local user names when nonexistent blogs are accessed. ORIGINAL ADVISORY: http://support.apple.com/kb/HT1897 OTHER REFERENCES: SA18008: http://secunia.com/advisories/18008/ SA18307: http://secunia.com/advisories/18307/ SA26273: http://secunia.com/advisories/26273/ SA26636: http://secunia.com/advisories/26636/ SA27093: http://secunia.com/advisories/27093/ SA27130: http://secunia.com/advisories/27130/ SA28081: http://secunia.com/advisories/28081/ SA28083: http://secunia.com/advisories/28083/ SA28323: http://secunia.com/advisories/28323/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.43

sources: NVD: CVE-2008-1575 // JVNDB: JVNDB-2008-001397 // BID: 29412 // BID: 29492 // VULHUB: VHN-31700 // PACKETSTORM: 66818 // PACKETSTORM: 66804

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5

Trust: 1.6

vendor:applemodel:mac os xscope:ltversion:v10.5.3

Trust: 0.8

vendor:applemodel:mac os x serverscope:ltversion:v10.5.3

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac os serverscope:neversion:x10.5.3

Trust: 0.6

vendor:applemodel:mac osscope:neversion:x10.5.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

sources: BID: 29412 // BID: 29492 // JVNDB: JVNDB-2008-001397 // CNNVD: CNNVD-200806-013 // NVD: CVE-2008-1575

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1575
value: HIGH

Trust: 1.0

IPA: JVNDB-2008-001397
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200806-013
value: CRITICAL

Trust: 0.6

VULHUB: VHN-31700
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-1575
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2008-001397
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-31700
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31700 // JVNDB: JVNDB-2008-001397 // CNNVD: CNNVD-200806-013 // NVD: CVE-2008-1575

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-31700 // JVNDB: JVNDB-2008-001397 // NVD: CVE-2008-1575

THREAT TYPE

network

Trust: 0.6

sources: BID: 29412 // BID: 29492

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200806-013

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001397

PATCH

title:Mac OS X 10.5.3url:http://support.apple.com/kb/HT1897

Trust: 0.8

title:Mac OS X 10.5.3url:http://support.apple.com/kb/HT1897?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001397

EXTERNAL IDS

db:NVDid:CVE-2008-1575

Trust: 2.8

db:BIDid:29412

Trust: 2.8

db:USCERTid:TA08-150A

Trust: 2.6

db:SECUNIAid:30430

Trust: 2.6

db:BIDid:29492

Trust: 2.0

db:SECTRACKid:1020133

Trust: 1.7

db:VUPENid:ADV-2008-1697

Trust: 1.7

db:XFid:42707

Trust: 1.4

db:USCERTid:SA08-150A

Trust: 0.8

db:SECTRACKid:1020132

Trust: 0.8

db:JVNDBid:JVNDB-2008-001397

Trust: 0.8

db:CNNVDid:CNNVD-200806-013

Trust: 0.7

db:CERT/CCid:TA08-150A

Trust: 0.6

db:APPLEid:APPLE-SA-2008-05-28

Trust: 0.6

db:VULHUBid:VHN-31700

Trust: 0.1

db:PACKETSTORMid:66818

Trust: 0.1

db:PACKETSTORMid:66804

Trust: 0.1

sources: VULHUB: VHN-31700 // BID: 29412 // BID: 29492 // JVNDB: JVNDB-2008-001397 // PACKETSTORM: 66818 // PACKETSTORM: 66804 // CNNVD: CNNVD-200806-013 // NVD: CVE-2008-1575

REFERENCES

url:http://www.securityfocus.com/bid/29412

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta08-150a.html

Trust: 2.5

url:http://secunia.com/advisories/30430

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2008//may/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/29492

Trust: 1.7

url:http://securitytracker.com/id?1020133

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/1697

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/42707

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/1697

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42707

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1575

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-150a/

Trust: 0.8

url:http://jvn.jp/tr/trta08-150a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1575

Trust: 0.8

url:http://securitytracker.com/id?1020132

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-150a.html

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://support.apple.com/kb/ht1338?viewlocale=en_us>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://support.apple.com/kb/ht1897>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple_security_update_2008_003>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-150a.html>

Trust: 0.1

url:http://secunia.com/advisories/26273/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1053update.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/18307/

Trust: 0.1

url:http://secunia.com/advisories/27093/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1053comboupdate.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008003ppc.html

Trust: 0.1

url:http://support.apple.com/kb/ht1897

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1053update.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008003serverppc.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008003serveruniversal.html

Trust: 0.1

url:http://secunia.com/advisories/27130/

Trust: 0.1

url:http://secunia.com/advisories/30430/

Trust: 0.1

url:http://secunia.com/network_software_inspector_2/

Trust: 0.1

url:http://secunia.com/advisories/26636/

Trust: 0.1

url:http://secunia.com/advisories/28083/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008003intel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1053comboupdate.html

Trust: 0.1

url:http://secunia.com/advisories/28081/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/18008/

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/advisories/28323/

Trust: 0.1

sources: VULHUB: VHN-31700 // BID: 29412 // BID: 29492 // JVNDB: JVNDB-2008-001397 // PACKETSTORM: 66818 // PACKETSTORM: 66804 // CNNVD: CNNVD-200806-013 // NVD: CVE-2008-1575

CREDITS

Melissa O'NeillPaul HaddadRodrigo CarvalhoGynvael Coldwind

Trust: 0.6

sources: CNNVD: CNNVD-200806-013

SOURCES

db:VULHUBid:VHN-31700
db:BIDid:29412
db:BIDid:29492
db:JVNDBid:JVNDB-2008-001397
db:PACKETSTORMid:66818
db:PACKETSTORMid:66804
db:CNNVDid:CNNVD-200806-013
db:NVDid:CVE-2008-1575

LAST UPDATE DATE

2025-04-10T22:22:30.531000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31700date:2017-08-08T00:00:00
db:BIDid:29412date:2008-06-04T00:23:00
db:BIDid:29492date:2008-06-03T19:43:00
db:JVNDBid:JVNDB-2008-001397date:2008-06-24T00:00:00
db:CNNVDid:CNNVD-200806-013date:2008-09-05T00:00:00
db:NVDid:CVE-2008-1575date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-31700date:2008-06-02T00:00:00
db:BIDid:29412date:2008-05-28T00:00:00
db:BIDid:29492date:2008-05-28T00:00:00
db:JVNDBid:JVNDB-2008-001397date:2008-06-24T00:00:00
db:PACKETSTORMid:66818date:2008-05-29T23:21:11
db:PACKETSTORMid:66804date:2008-05-29T23:19:06
db:CNNVDid:CNNVD-200806-013date:2008-05-28T00:00:00
db:NVDid:CVE-2008-1575date:2008-06-02T21:30:00