VAR-200702-0109

Vulnerability from variot - Updated: 2024-07-23 19:41

The Bonjour functionality in iChat in Apple Mac OS X 10.3.9 allows remote attackers to cause a denial of service (persistent application crash) via unspecified vectors, possibly related to CVE-2007-0614. Apple iChat is prone to multiple remote denial-of-service vulnerabilities. These issues affect the Bonjour functionality. Apple iChat 3.1.6 is reported affected; other versions may be vulnerable as well. Apple iChat is a video chat tool bundled with Apple's family of operating systems. Several denial-of-service vulnerabilities exist in iChat's Bonjour feature, which allows automatic discovery of computers. There are no restrictions on finding available contacts via mDNS queries, iChat will add the broadcasted _presence._tcp record even if the contact does not exist, so a malicious user can broadcast a fake record so that iChat users using Bonjour cannot discover more peers, unable to communicate reliably. Trying to start iChat Bonjour again will fail because mDNSResponder keeps a specially crafted record.


To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German.

The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios.

The vulnerability exists due to an error in the "fpathconf()" syscall when it is called with an unsupported file type and can be exploited to cause a system panic.

The vulnerability is confirmed in version 10.4.8.

SOLUTION: Grant only trusted users access to affected systems.

PROVIDED AND/OR DISCOVERED BY: Initially discovered in FreeBSD and reported in Mac OS X by Ilja Van Sprundel.

ORIGINAL ADVISORY: http://projects.info-pull.com/mokb/MOKB-09-11-2006.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200702-0109",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 2.4,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "ichat",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "*"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.3.x"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.x"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.3.x"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.x"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "10.3.9"
      },
      {
        "model": "ichat",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "3.1.6"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "db": "BID",
        "id": "22304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:apple:ichat:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "LMH lmh@info-pull.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-0710",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2007-0710",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-24072",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-0710",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#346656",
            "trust": 0.8,
            "value": "17.10"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#765096",
            "trust": 0.8,
            "value": "5.18"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#836024",
            "trust": 0.8,
            "value": "2.48"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-0710",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200702-343",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-24072",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Bonjour functionality in iChat in Apple Mac OS X 10.3.9 allows remote attackers to cause a denial of service (persistent application crash) via unspecified vectors, possibly related to CVE-2007-0614. Apple iChat is prone to multiple remote denial-of-service vulnerabilities.  These issues affect the Bonjour functionality. \nApple iChat 3.1.6 is reported affected; other versions may be vulnerable as well. Apple iChat is a video chat tool bundled with Apple\u0027s family of operating systems. Several denial-of-service vulnerabilities exist in iChat\u0027s Bonjour feature, which allows automatic discovery of computers. There are no restrictions on finding available contacts via mDNS queries, iChat will add the broadcasted _presence._tcp record even if the contact does not exist, so a malicious user can broadcast a fake record so that iChat users using Bonjour cannot discover more peers, unable to communicate reliably. Trying to start iChat Bonjour again will fail because mDNSResponder keeps a specially crafted record. \n\n----------------------------------------------------------------------\n\nTo improve our services to our customers, we have made a number of\nadditions to the Secunia Advisories and have started translating the\nadvisories to German. \n\nThe improvements will help our customers to get a better\nunderstanding of how we reached our conclusions, how it was rated,\nour thoughts on exploitation, attack vectors, and scenarios. \n\nThe vulnerability exists due to an error in the \"fpathconf()\" syscall\nwhen it is called with an unsupported file type and can be exploited\nto cause a system panic. \n\nThe vulnerability is confirmed in version 10.4.8. \n\nSOLUTION:\nGrant only trusted users access to affected systems. \n\nPROVIDED AND/OR DISCOVERED BY:\nInitially discovered in FreeBSD and reported in Mac OS X by Ilja Van\nSprundel. \n\nORIGINAL ADVISORY:\nhttp://projects.info-pull.com/mokb/MOKB-09-11-2006.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "db": "BID",
        "id": "22304"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      }
    ],
    "trust": 4.23
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-24072",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "SECTRACK",
        "id": "1017661",
        "trust": 3.3
      },
      {
        "db": "SECUNIA",
        "id": "24198",
        "trust": 3.3
      },
      {
        "db": "CERT/CC",
        "id": "VU#836024",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "22304",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0710",
        "trust": 2.8
      },
      {
        "db": "OSVDB",
        "id": "32713",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "24479",
        "trust": 1.6
      },
      {
        "db": "SECTRACK",
        "id": "1017751",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "22808",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "23088",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "21291",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "20982",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "23945",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343",
        "trust": 0.7
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2007-02-15",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "3230",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-24072",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "51846",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "db": "BID",
        "id": "22304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "id": "VAR-200702-0109",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-07-23T19:41:23.897000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security Update 2007-002 (Panther)",
        "trust": 0.8,
        "url": "http://www.apple.com/support/downloads/securityupdate2007002panther.html"
      },
      {
        "title": "Security Update 2007-002 (PPC)",
        "trust": 0.8,
        "url": "http://www.apple.com/support/downloads/securityupdate2007002ppc.html"
      },
      {
        "title": "Security Update 2007-002 (Universal)",
        "trust": 0.8,
        "url": "http://www.apple.com/support/downloads/securityupdate2007002universal.html"
      },
      {
        "title": "Security Update 2007-002",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=305102-en"
      },
      {
        "title": "Security Update 2007-002",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=305102-ja"
      },
      {
        "title": "Security Update 2007-002 (PPC)",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002ppc.html"
      },
      {
        "title": "Security Update 2007-002 (Universal)",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002universal.html"
      },
      {
        "title": "Security Update 2007-002 (Panther)",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002panther.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://docs.info.apple.com/article.html?artnum=305102"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/22304"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/836024"
      },
      {
        "trust": 2.5,
        "url": "http://www.securitytracker.com/id?1017661"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2007/feb/msg00000.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/32713"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24198"
      },
      {
        "trust": 1.6,
        "url": "http://docs.info.apple.com/article.html?artnum=305214"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/24479/"
      },
      {
        "trust": 1.6,
        "url": "http://securitytracker.com/alerts/2007/mar/1017751.html"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/24198/"
      },
      {
        "trust": 1.1,
        "url": "http://projects.info-pull.com/moab/moab-29-01-2007.html"
      },
      {
        "trust": 0.9,
        "url": "http://projects.info-pull.com/mokb/mokb-09-11-2006.html"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/22808/"
      },
      {
        "trust": 0.8,
        "url": "http://projects.info-pull.com/mokb/mokb-26-11-2006.html"
      },
      {
        "trust": 0.8,
        "url": "http://projects.info-pull.com/mokb/bug-files/mokb-26-11-2006.bz2"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/23088/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/21291"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/20982"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/23945/"
      },
      {
        "trust": 0.8,
        "url": "http://www.apple.com/macosx/features/ichat/"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/networking/bonjour/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2007/feb/1017661.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0710"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0710"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/ichat/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/products/48/?r=l"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/how_to_buy/15/?r=l"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "db": "BID",
        "id": "22304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "db": "BID",
        "id": "22304"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "date": "2007-03-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "date": "2007-02-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "date": "2007-02-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "date": "2007-01-29T00:00:00",
        "db": "BID",
        "id": "22304"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "date": "2006-11-10T16:02:24",
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "date": "2007-01-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      },
      {
        "date": "2007-02-16T19:28:00",
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "date": "2007-07-21T00:00:00",
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "date": "2007-03-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#836024"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24072"
      },
      {
        "date": "2016-07-06T14:40:00",
        "db": "BID",
        "id": "22304"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000121"
      },
      {
        "date": "2007-02-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      },
      {
        "date": "2008-09-05T21:18:36.677000",
        "db": "NVD",
        "id": "CVE-2007-0710"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS X fails to properly handle corrupted Universal Mach-O Binaries",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-343"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…