Overview
A vulnerability in the way Apple Mac OS X handles corrupted Universal Mach-O Binaries may result in execution of arbitrary code or denial of service.
Description
Apple Mac OS X uses the Mach-O file format's ability to support more than one type of machine code to create Mac OS X Universal binaries. Apple Mac OS X contains a vulnerability in the way corrupted Universal Mach-O Binaries are handled. According to Apple Security Update 2007-003: An integer overflow vulnerability exists in the loading of Universal Mach-O binaries. This could allow a malicious local user to cause a kernel panic or to obtain system privileges. This has been described on the Month of Kernel Bugs web site (MOKB-26-11-2006). This update addresses the issue by performing additional validation of Universal binaries. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code with kernel privileges or cause a denial of service. |
Solution
Upgrade |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://projects.info-pull.com/mokb/MOKB-26-11-2006.html
- http://projects.info-pull.com/mokb/bug-files/MOKB-26-11-2006.bz2
- http://secunia.com/advisories/23088/
- http://docs.info.apple.com/article.html?artnum=305214
- http://secunia.com/advisories/24479/
- http://securitytracker.com/alerts/2007/Mar/1017751.html
- http://www.securityfocus.com/bid/21291
Acknowledgements
This issue was reported in Month of Kernal Bugs MOKB-26-11-2006 by LMH.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2006-6129 |
Severity Metric: | 17.10 |
Date Public: | 2006-11-26 |
Date First Published: | 2007-03-14 |
Date Last Updated: | 2007-03-30 22:26 UTC |
Document Revision: | 27 |