var-200704-0220
Vulnerability from variot
Buffer overflow in natd in network_cmds in Apple Mac OS X 10.3.9 through 10.4.9, when Internet Sharing is enabled, allows remote attackers to execute arbitrary code via malformed RTSP packets. A vulnerability exists in the Kerberos administration daemon that may allow a remote, unauthenticated user to free uninitialized pointers. Freeing uninitialized pointers corrupts memory in a way that could allow an attacker to execute code. This vulnerability occurs in an environment where Internet sharing is enabled.Third party crafted RTSP Arbitrary code could be executed by processing the packet. These issues affect Mac OS X and various applications, including AFP Client, AirPortDriver module, CoreServices, Libinfo, Login Window, Natd, SMB, System Configuration, URLMount, VideoConference framework, WebDAV, and WebFoundation. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, overwrite files, and access potentially sensitive information. Both local and remote vulnerabilities are present. This vulnerability only affects users who have Internet Sharing enabled.
Secunia is proud to announce the availability of the Secunia Software Inspector.
The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.
Try it out online: http://secunia.com/software_inspector/
TITLE: Fedora Core 6 update for krb5
SECUNIA ADVISORY ID: SA23706
VERIFY ADVISORY: http://secunia.com/advisories/23706/
CRITICAL: Highly critical
IMPACT: DoS, System access
WHERE:
From remote
OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/
DESCRIPTION: Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
For more information: SA23690 SA23696
SOLUTION: Apply updated packages.
Fedora Core 6:
43b1b9c946f30629489b903961472d9b0cdf1cd8 SRPMS/krb5-1.5-13.src.rpm 43b1b9c946f30629489b903961472d9b0cdf1cd8 noarch/krb5-1.5-13.src.rpm 42b9b525ea97d128ed22c6feb7b48cc377ca46ad ppc/debug/krb5-debuginfo-1.5-13.ppc.rpm 51c9dfac74d9026509906e953cf92ac50e1a13c4 ppc/krb5-workstation-1.5-13.ppc.rpm 39a5ed204a75766df9daf51a66971f51700d563c ppc/krb5-server-1.5-13.ppc.rpm bce7df56293ae51d79ce1e054b3056d24a1ae8d5 ppc/krb5-devel-1.5-13.ppc.rpm 9097a6f8fdda32e8b976b0beb2b03ba66172327e ppc/krb5-libs-1.5-13.ppc.rpm 51c1f15fca97f267cabd1d1a9851a349fc5a3648 x86_64/krb5-workstation-1.5-13.x86_64.rpm 7cc0d54545539827434c7975697c9c13ae9e4797 x86_64/debug/krb5-debuginfo-1.5-13.x86_64.rpm 71fcdc5dadb273576ad9e530fbb15764650cb84b x86_64/krb5-devel-1.5-13.x86_64.rpm bbe8f1b3e7c6077526f760b361ad6ca5d4039276 x86_64/krb5-libs-1.5-13.x86_64.rpm e38c1dccd2310d3bab9d204226988aee627cfe0d x86_64/krb5-server-1.5-13.x86_64.rpm 02ddf8b25bea088b4de3cc8c27fcf3eb2967efa6 i386/debug/krb5-debuginfo-1.5-13.i386.rpm d6470636e983d8559d4378f819fba80b467af0a5 i386/krb5-libs-1.5-13.i386.rpm 278c19ec68ed47d35c5c2370df5c48807dba1224 i386/krb5-workstation-1.5-13.i386.rpm aa72a083b60ddfb3dbc0761f13ea7147e09995f1 i386/krb5-server-1.5-13.i386.rpm 9cfd3d1d48deb0e7f83a0a13a5ddf2383386b400 i386/krb5-devel-1.5-13.i386.rpm
ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2375
OTHER REFERENCES: SA23690: http://secunia.com/advisories/23690/
SA23696: http://secunia.com/advisories/23696/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200704-0220", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.2" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.9" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.6" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.4" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.3.9" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.8" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.1" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.7" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4" }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.4.3" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4.5" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mit kerberos team", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "rpath", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.9" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.9" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.9" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "directory pro", "scope": "eq", "trust": 0.3, "vendor": "cosmicperl", "version": "10.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.03" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os preview.app", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x3.0.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#831452" }, { "db": "BID", "id": "23569" }, { "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "db": "CNNVD", "id": "CNNVD-200704-435" }, { "db": "NVD", "id": "CVE-2007-0741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-0741" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Landon FullerMu SecurityDaniel BallGeoff FranksJamie Cox", "sources": [ { "db": "CNNVD", "id": "CNNVD-200704-435" } ], "trust": 0.6 }, "cve": "CVE-2007-0741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2007-0741", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-24103", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-0741", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#831452", "trust": 0.8, "value": "20.93" }, { "author": "CNNVD", "id": "CNNVD-200704-435", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-24103", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#831452" }, { "db": "VULHUB", "id": "VHN-24103" }, { "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "db": "CNNVD", "id": "CNNVD-200704-435" }, { "db": "NVD", "id": "CVE-2007-0741" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in natd in network_cmds in Apple Mac OS X 10.3.9 through 10.4.9, when Internet Sharing is enabled, allows remote attackers to execute arbitrary code via malformed RTSP packets. A vulnerability exists in the Kerberos administration daemon that may allow a remote, unauthenticated user to free uninitialized pointers. Freeing uninitialized pointers corrupts memory in a way that could allow an attacker to execute code. This vulnerability occurs in an environment where Internet sharing is enabled.Third party crafted RTSP Arbitrary code could be executed by processing the packet. \nThese issues affect Mac OS X and various applications, including AFP Client, AirPortDriver module, CoreServices, Libinfo, Login Window, Natd, SMB, System Configuration, URLMount, VideoConference framework, WebDAV, and WebFoundation. \nAttackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, overwrite files, and access potentially sensitive information. Both local and remote vulnerabilities are present. This vulnerability only affects users who have Internet Sharing enabled. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nFedora Core 6 update for krb5\n\nSECUNIA ADVISORY ID:\nSA23706\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23706/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nFedora Core 6\nhttp://secunia.com/product/12487/\n\nDESCRIPTION:\nFedora has issued an update for krb5. This fixes some\nvulnerabilities, which can be exploited by malicious people to cause\na DoS (Denial of Service) or potentially compromise a vulnerable\nsystem. \n\nFor more information:\nSA23690\nSA23696\n\nSOLUTION:\nApply updated packages. \n\nFedora Core 6:\n\n43b1b9c946f30629489b903961472d9b0cdf1cd8 SRPMS/krb5-1.5-13.src.rpm\n43b1b9c946f30629489b903961472d9b0cdf1cd8 noarch/krb5-1.5-13.src.rpm\n42b9b525ea97d128ed22c6feb7b48cc377ca46ad\nppc/debug/krb5-debuginfo-1.5-13.ppc.rpm\n51c9dfac74d9026509906e953cf92ac50e1a13c4\nppc/krb5-workstation-1.5-13.ppc.rpm\n39a5ed204a75766df9daf51a66971f51700d563c\nppc/krb5-server-1.5-13.ppc.rpm\nbce7df56293ae51d79ce1e054b3056d24a1ae8d5\nppc/krb5-devel-1.5-13.ppc.rpm\n9097a6f8fdda32e8b976b0beb2b03ba66172327e\nppc/krb5-libs-1.5-13.ppc.rpm\n51c1f15fca97f267cabd1d1a9851a349fc5a3648\nx86_64/krb5-workstation-1.5-13.x86_64.rpm\n7cc0d54545539827434c7975697c9c13ae9e4797\nx86_64/debug/krb5-debuginfo-1.5-13.x86_64.rpm\n71fcdc5dadb273576ad9e530fbb15764650cb84b\nx86_64/krb5-devel-1.5-13.x86_64.rpm\nbbe8f1b3e7c6077526f760b361ad6ca5d4039276\nx86_64/krb5-libs-1.5-13.x86_64.rpm\ne38c1dccd2310d3bab9d204226988aee627cfe0d\nx86_64/krb5-server-1.5-13.x86_64.rpm\n02ddf8b25bea088b4de3cc8c27fcf3eb2967efa6\ni386/debug/krb5-debuginfo-1.5-13.i386.rpm\nd6470636e983d8559d4378f819fba80b467af0a5\ni386/krb5-libs-1.5-13.i386.rpm\n278c19ec68ed47d35c5c2370df5c48807dba1224\ni386/krb5-workstation-1.5-13.i386.rpm\naa72a083b60ddfb3dbc0761f13ea7147e09995f1\ni386/krb5-server-1.5-13.i386.rpm\n9cfd3d1d48deb0e7f83a0a13a5ddf2383386b400\ni386/krb5-devel-1.5-13.i386.rpm\n\nORIGINAL ADVISORY:\nhttp://fedoranews.org/cms/node/2375\n\nOTHER REFERENCES:\nSA23690:\nhttp://secunia.com/advisories/23690/\n\nSA23696:\nhttp://secunia.com/advisories/23696/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-0741" }, { "db": "CERT/CC", "id": "VU#831452" }, { "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "db": "BID", "id": "23569" }, { "db": "VULHUB", "id": "VHN-24103" }, { "db": "PACKETSTORM", "id": "53502" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "23569", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2007-0741", "trust": 2.8 }, { "db": "SECUNIA", "id": "24966", "trust": 2.5 }, { "db": "SECTRACK", "id": "1017942", "trust": 2.5 }, { "db": "USCERT", "id": "TA07-109A", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2007-1470", "trust": 1.7 }, { "db": "OSVDB", "id": "34865", "trust": 1.7 }, { "db": "SECUNIA", "id": "23706", "trust": 0.9 }, { "db": "BID", "id": "21975", "trust": 0.8 }, { "db": "SECUNIA", "id": "23701", "trust": 0.8 }, { "db": "SECUNIA", "id": "23903", "trust": 0.8 }, { "db": "SECUNIA", "id": "23667", "trust": 0.8 }, { "db": "SECUNIA", "id": "23690", "trust": 0.8 }, { "db": "SECTRACK", "id": "1017494", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#831452", "trust": 0.8 }, { "db": "USCERT", "id": "SA07-109A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2007-000314", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200704-435", "trust": 0.7 }, { "db": "CERT/CC", "id": "TA07-109A", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2007-04-19", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-24103", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "53502", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#831452" }, { "db": "VULHUB", "id": "VHN-24103" }, { "db": "BID", "id": "23569" }, { "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "db": "PACKETSTORM", "id": "53502" }, { "db": "CNNVD", "id": "CNNVD-200704-435" }, { "db": "NVD", "id": "CVE-2007-0741" } ] }, "id": "VAR-200704-0220", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-24103" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:33:23.970000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Update 2007-004 v1.1 (PPC)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2007004v11ppc.html" }, { "title": "Security Update 2007-004 v1.1 (10.3.9 Client)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2007004v111039client.html" }, { "title": "Security Update 2007-004 (10.3.9 Server)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate20070041039server.html" }, { "title": "Security Update 2007-004 v1.1 (Universal)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2007004v11universal.html" }, { "title": "Security Update 2007-004", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305391-en" }, { "title": "Security Update 2007-004", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305391-ja" }, { "title": "Security Update 2007-004 (10.3.9 Server)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate20070041039server.html" }, { "title": "Security Update 2007-004 v1.1 (Universal)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11universal.html" }, { "title": "Security Update 2007-004 v1.1 (PPC)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11ppc.html" }, { "title": "Security Update 2007-004 v1.1 (10.3.9 Client)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v111039client.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-0741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/23569" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta07-109a.html" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1017942" }, { "trust": 2.5, "url": "http://secunia.com/advisories/24966" }, { "trust": 2.0, "url": "http://docs.info.apple.com/article.html?artnum=305391" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2007/apr/msg00001.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/34865" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/1470" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/1470" }, { "trust": 0.9, "url": "http://secunia.com/advisories/23706/" }, { "trust": 0.9, "url": "http://secunia.com/advisories/23690/" }, { "trust": 0.8, "url": "http://web.mit.edu/kerberos/www/advisories/mitkrb5-sa-2006-003-mechglue.txt" }, { "trust": 0.8, "url": "http://web.mit.edu/kerberos/advisories/2006-003-patch.txt" }, { "trust": 0.8, "url": "http://web.mit.edu/kerberos/advisories/2006-003-patch.txt.asc" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2007/jan/1017494.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/21975" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23903/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23701/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23667/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0741" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta07-109a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta07-109a/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0741" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa07-109a.html" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "http://landonf.bikemonkey.org/2007/04/19#moab_fixes_net_a_bug.20070419203514.5302.timor" }, { "trust": 0.3, "url": "http://labs.musecurity.com/advisories/mu-200704-01.txt" }, { "trust": 0.1, "url": "http://secunia.com/advisories/23696/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/12487/" }, { "trust": 0.1, "url": "http://fedoranews.org/cms/node/2375" }, { "trust": 0.1, "url": "http://secunia.com/software_inspector/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#831452" }, { "db": "VULHUB", "id": "VHN-24103" }, { "db": "BID", "id": "23569" }, { "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "db": "PACKETSTORM", "id": "53502" }, { "db": "CNNVD", "id": "CNNVD-200704-435" }, { "db": "NVD", "id": "CVE-2007-0741" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#831452" }, { "db": "VULHUB", "id": "VHN-24103" }, { "db": "BID", "id": "23569" }, { "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "db": "PACKETSTORM", "id": "53502" }, { "db": "CNNVD", "id": "CNNVD-200704-435" }, { "db": "NVD", "id": "CVE-2007-0741" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-01-09T00:00:00", "db": "CERT/CC", "id": "VU#831452" }, { "date": "2007-04-24T00:00:00", "db": "VULHUB", "id": "VHN-24103" }, { "date": "2007-04-19T00:00:00", "db": "BID", "id": "23569" }, { "date": "2007-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "date": "2007-01-10T18:19:08", "db": "PACKETSTORM", "id": "53502" }, { "date": "2007-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200704-435" }, { "date": "2007-04-24T17:19:00", "db": "NVD", "id": "CVE-2007-0741" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-05-10T00:00:00", "db": "CERT/CC", "id": "VU#831452" }, { "date": "2011-03-08T00:00:00", "db": "VULHUB", "id": "VHN-24103" }, { "date": "2007-05-02T20:29:00", "db": "BID", "id": "23569" }, { "date": "2007-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000314" }, { "date": "2007-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200704-435" }, { "date": "2011-03-08T02:50:38.860000", "db": "NVD", "id": "CVE-2007-0741" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200704-435" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kerberos administration daemon may free uninitialized pointers", "sources": [ { "db": "CERT/CC", "id": "VU#831452" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200704-435" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.