ID

VAR-200808-0008


CVE

CVE-2008-2325


TITLE

Apple Mac OS X of QuickLook Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-001604

DESCRIPTION

QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking.". Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-005. The security update addresses a total of six new vulnerabilities that affect the CarbonCore, CoreGraphics, Data Detectors Engine, Disk Utility, OpenLDAP, and QuickLook components of Mac OS X. The advisory also contains security updates for 11 previously reported issues. NOTE: This BID is being retired; the following individual records have been created to better document these issues: 30487 Apple Mac OS X CarbonCore Stack Based Buffer Overflow 30488 Apple Mac OS X CoreGraphics Multiple Memory Corruption Vulnerabilities 30489 Apple Mac OS X CoreGraphics Heap Based Buffer Overflow Vulnerability 30490 Apple Mac OS X Data Detectors Engine Denial Of Service Vulnerability 30492 Apple Mac OS X Disk Utility Privilege Escalation Vulnerability 30493 Apple Mac OS X QuickLook Multiple Memory Corruption Vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the affected application or cause denial-of-service conditions. The following versions are affected: Mac OS X v10.5.4 and prior Mac OS X Server v10.5.4 and prior This issue does not affect systems prior to Mac OS X v10.5. 1) A vulnerability in BIND can be exploited to poison the DNS cache. For more information: SA30973 2) A boundary error exists in CarbonCore when handling filenames. This can be exploited to cause a stack-based buffer overflow via overly long filenames. Successful exploitation of the vulnerability may allow execution of arbitrary code. 3) Multiple errors exist in CoreGraphics when processing received arguments. These can be exploited to trigger a memory corruption by e.g. tricking a user into visiting a specially crafted website. Successful exploitation of the vulnerability may allow execution of arbitrary code. 4) An integer overflow error exists in CoreGraphics when handling PDF files. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file. Successful exploitation of the vulnerability may allow execution of arbitrary code. 5) Multiple errors in QuickLook when downloading Microsoft Office files can be exploited to cause a memory corruption. Successful exploitation of the vulnerability may allow execution of arbitrary code. 6) An error exists in the Data Detectors engine when viewing a specially crafted message. This can be exploited to consume overly large resources and trigger an application using the engine to terminate. 7) The problem is that the "Repair Permissions" tool included in Disk Utility sets the "setuid" bit on "/usr/bin/emacs". This can be exploited to execute arbitrary commands with system privileges. 8) An error in OpenLDAP when parsing ASN.1 BER encoded packets can be exploited to cause a DoS. For more information: SA30853 9) A boundary error exists in the OpenSSL "SSL_get_shared_ciphers()" function. For more information see vulnerability #4 in: SA22130 10) Some vulnerabilities in PHP can be exploited malicious users to bypass certain security restrictions, and potentially by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. For more information: SA30048 11) Two vulnerabilities in rsync can be exploited by malicious users to bypass certain security restrictions. For more information: SA27863 SOLUTION: Apply Security Update 2008-005. Security Update 2008-005 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008005serverppc.html Security Update 2008-005 Server (Intel): http://www.apple.com/support/downloads/securityupdate2008005serverintel.html Security Update 2008-005 (PPC): http://www.apple.com/support/downloads/securityupdate2008005ppc.html Security Update 2008-005 (Intel): http://www.apple.com/support/downloads/securityupdate2008005intel.html Security Update 2008-005 (Leopard): http://www.apple.com/support/downloads/securityupdate2008005leopard.html PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Dan Kaminsky of IOActive 2) Thomas Raffetseder of the International Secure Systems Lab and Sergio 'shadown' Alvarez of n.runs AG. 3) Michal Zalewski, Google 4) Pariente Kobi, reported via iDefense 7) Anton Rang and Brian Timares ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT2647 OTHER REFERENCES: SA22130: http://secunia.com/advisories/22130/ SA27863: http://secunia.com/advisories/27863/ SA30048: http://secunia.com/advisories/30048/ SA30973: http://secunia.com/advisories/30973/ SA30853: http://secunia.com/advisories/30853/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2008-2325 // JVNDB: JVNDB-2008-001604 // BID: 30483 // BID: 30493 // VULHUB: VHN-32450 // PACKETSTORM: 68761

AFFECTED PRODUCTS

vendor:applemodel:quicklookscope:eqversion:*

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.4

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.4.11

Trust: 0.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.4

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.5.4

Trust: 0.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.11

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

sources: BID: 30483 // BID: 30493 // JVNDB: JVNDB-2008-001604 // CNNVD: CNNVD-200808-029 // NVD: CVE-2008-2325

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2325
value: HIGH

Trust: 1.0

NVD: CVE-2008-2325
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200808-029
value: CRITICAL

Trust: 0.6

VULHUB: VHN-32450
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2325
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32450
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32450 // JVNDB: JVNDB-2008-001604 // CNNVD: CNNVD-200808-029 // NVD: CVE-2008-2325

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-32450 // JVNDB: JVNDB-2008-001604 // NVD: CVE-2008-2325

THREAT TYPE

network

Trust: 0.6

sources: BID: 30483 // BID: 30493

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200808-029

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001604

PATCH

title:Security Update 2008-005url:http://support.apple.com/kb/HT2647

Trust: 0.8

title:Security Update 2008-005url:http://support.apple.com/kb/HT2647?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001604

EXTERNAL IDS

db:NVDid:CVE-2008-2325

Trust: 3.1

db:BIDid:30493

Trust: 2.8

db:SECUNIAid:31326

Trust: 2.6

db:BIDid:30483

Trust: 2.0

db:SECTRACKid:1020607

Trust: 1.7

db:VUPENid:ADV-2008-2268

Trust: 1.7

db:JVNDBid:JVNDB-2008-001604

Trust: 0.8

db:XFid:44135

Trust: 0.6

db:APPLEid:APPLE-SA-2008-07-31

Trust: 0.6

db:CNNVDid:CNNVD-200808-029

Trust: 0.6

db:VULHUBid:VHN-32450

Trust: 0.1

db:PACKETSTORMid:68761

Trust: 0.1

sources: VULHUB: VHN-32450 // BID: 30483 // BID: 30493 // JVNDB: JVNDB-2008-001604 // PACKETSTORM: 68761 // CNNVD: CNNVD-200808-029 // NVD: CVE-2008-2325

REFERENCES

url:http://www.securityfocus.com/bid/30493

Trust: 2.5

url:http://secunia.com/advisories/31326

Trust: 2.5

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.7

url:http://www.securityfocus.com/bid/30483

Trust: 1.7

url:http://www.securitytracker.com/id?1020607

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/2268

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/44135

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2325

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2325

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/44135

Trust: 0.6

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/advisories/27863/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://support.apple.com/kb/ht2647

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005leopard.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005serverintel.html

Trust: 0.1

url:http://secunia.com/advisories/22130/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30048/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005intel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005serverppc.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30853/

Trust: 0.1

url:http://secunia.com/advisories/30973/

Trust: 0.1

url:http://secunia.com/advisories/31326/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005ppc.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

sources: VULHUB: VHN-32450 // BID: 30483 // BID: 30493 // JVNDB: JVNDB-2008-001604 // PACKETSTORM: 68761 // CNNVD: CNNVD-200808-029 // NVD: CVE-2008-2325

CREDITS

Michal Zalewski※ lcamtuf@echelon.pl

Trust: 0.6

sources: CNNVD: CNNVD-200808-029

SOURCES

db:VULHUBid:VHN-32450
db:BIDid:30483
db:BIDid:30493
db:JVNDBid:JVNDB-2008-001604
db:PACKETSTORMid:68761
db:CNNVDid:CNNVD-200808-029
db:NVDid:CVE-2008-2325

LAST UPDATE DATE

2025-04-10T21:29:55.972000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32450date:2017-08-08T00:00:00
db:BIDid:30483date:2008-08-01T17:57:00
db:BIDid:30493date:2008-08-01T17:17:00
db:JVNDBid:JVNDB-2008-001604date:2008-09-03T00:00:00
db:CNNVDid:CNNVD-200808-029date:2008-09-11T00:00:00
db:NVDid:CVE-2008-2325date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-32450date:2008-08-04T00:00:00
db:BIDid:30483date:2008-07-31T00:00:00
db:BIDid:30493date:2008-07-31T00:00:00
db:JVNDBid:JVNDB-2008-001604date:2008-09-03T00:00:00
db:PACKETSTORMid:68761date:2008-08-01T22:41:42
db:CNNVDid:CNNVD-200808-029date:2008-07-31T00:00:00
db:NVDid:CVE-2008-2325date:2008-08-04T01:41:00