var-200712-0432
Vulnerability from variot

Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service. Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications, including Address Book, CFNetwork, ColorSync, CoreFoundation, CUPS, Desktop Services, iChat, IO Storage Family, Launch Services, Mail, Quick Look, Safari, Safari RSS, SMB, Software Update, Spin Tracer, Spotlight, tcpdump, and XQuery. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. Apple Mac OS X 10.5.1 and prior versions are vulnerable to these issues.

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.

1) A signedness error exists within the processing of ASN1 encoded strings from SNMP responses.

For more information: SA28129

The vulnerability affects openSUSE 10.2 and 10.3 only.

x86 Platform:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-1.2.12-22.6.i586.rpm e844b0c92d437c25e71c9be92c3d6ee4

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-client-1.2.12-22.6.i586.rpm 7f3525adc1a7ab85f3650fd9adf69bc8

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-devel-1.2.12-22.6.i586.rpm 88ea6ba071bd51ee23b87c5d13a551b6

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-libs-1.2.12-22.6.i586.rpm 5a41077855e2e502d6c1cfb5e369ef8b

openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-1.2.7-12.9.i586.rpm c4163c0ad47db8221f9b1ea41bdbf259

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-client-1.2.7-12.9.i586.rpm b55019f39c36ea6ef3352635b7093705

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-devel-1.2.7-12.9.i586.rpm f83d6477eb8f1c2ed76ba1f4b896ced3

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-libs-1.2.7-12.9.i586.rpm 295394a3fdc59c155d1683a3084df888

SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-1.1.23-40.35.i586.rpm a5efab6d27bc1262873d4b467e288bbd

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-client-1.1.23-40.35.i586.rpm 69b85c943b27dccf4fd3c69072ee01de

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-devel-1.1.23-40.35.i586.rpm 8ab20affa8deb5a6d75481e244935761

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-libs-1.1.23-40.35.i586.rpm 79005dc03c94da463a65b6313a06515e

Power PC Platform:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-1.2.12-22.6.ppc.rpm 63f5378c91584358555df660d128cc0f

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-client-1.2.12-22.6.ppc.rpm 835d0e286f18d2fa5bba7fa6a0ecef60

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-devel-1.2.12-22.6.ppc.rpm 47bf9d7837037bc8ea2394a3c63cdf2e

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-libs-1.2.12-22.6.ppc.rpm 7421ec50af012b698f9f3e55b8dc15db

openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-1.2.7-12.9.ppc.rpm ccabb5d2c72bc5fa707289b1d2529884

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-client-1.2.7-12.9.ppc.rpm 06e88fbb162d9505027071cfb49c2981 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-devel-1.2.7-12.9.ppc.rpm fdd75eb988613f025a6882e509e6f8db ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-libs-1.2.7-12.9.ppc.rpm cf062d8d41eddd7eef98fb9518db4f26

SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-1.1.23-40.35.ppc.rpm 2abd05fc5936cb3b3c54af60dc9f4cce

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-client-1.1.23-40.35.ppc.rpm e503e321ae5683fe8ea66084616fe0f1

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-devel-1.1.23-40.35.ppc.rpm 5c5c12e135f4f3a3dd752a24f165c80c

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-libs-1.1.23-40.35.ppc.rpm 17b18d3827777331560d97ff934f7a2b

x86-64 Platform:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-1.2.12-22.6.x86_64.rpm f04e3ddc357e5c81e6db4170d2d773e7

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-client-1.2.12-22.6.x86_64.rpm 8b91333502a71746b16a77369d062b33

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-devel-1.2.12-22.6.x86_64.rpm 6599150352f49d5494125502a86d8930

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-libs-1.2.12-22.6.x86_64.rpm c1635a3dab2ddda61b1ea7ed835334f8

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-libs-32bit-1.2.12-22.6.x86_64.rpm e84064f49db1ec54dbf9247148d91ee7

openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-1.2.7-12.9.x86_64.rpm a71b6141bac10ef6b32fd156e107afa6

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-client-1.2.7-12.9.x86_64.rpm 971d1b6ed9965673b232c18c8c6897f0

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-devel-1.2.7-12.9.x86_64.rpm dcca8172ada73a69773b2be6e6b5a46e

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-libs-1.2.7-12.9.x86_64.rpm e418b6e5ab33453fabb81a0a64d72587

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-libs-32bit-1.2.7-12.9.x86_64.rpm 4c9bb5f870772967b8dcb6d47e4118c5

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-1.1.23-40.35.x86_64.rpm 56c999311218649e26f5e5b745f206de

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-client-1.1.23-40.35.x86_64.rpm f7f80373487516f8258f5d32497deade

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-devel-1.1.23-40.35.x86_64.rpm 7b734519a2317ad3b706e2661c67fc3f

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-libs-1.1.23-40.35.x86_64.rpm facfda468d147b872cd003cf38dd385d

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-libs-32bit-1.1.23-40.35.x86_64.rpm 48fdaa964afc64d86ebb59670a2100fb

Sources:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/cups-1.2.12-22.6.src.rpm ed83be3003be5537bdbf50274c6fea06

openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/cups-1.2.7-12.9.src.rpm 9c0ba6d4e3c15b81642d65d5e5582ef2

SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/cups-1.1.23-40.35.src.rpm ca0082ed490367ee4dba961dd1d5081f

Open Enterprise Server

http://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html

Novell Linux POS 9

http://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html

Novell Linux Desktop 9

http://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html

SUSE Linux Enterprise Server 10 SP1

http://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html

SUSE Linux Enterprise Desktop 10 SP1

http://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html

SUSE SLES 9

http://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html

ORIGINAL ADVISORY: http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html

OTHER REFERENCES: SA28129: http://secunia.com/advisories/28129/

SA28136: http://secunia.com/advisories/28136/

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

I. Further details are available in the related vulnerability notes. These products include: * Adobe Flash * Adobe Shockwave * GNU Tar

II. Impact

The impacts of these vulnerabilities vary. Potential consequences include arbitrary code execution, sensitive information disclosure, surreptitious video conference initiation, and denial of service.

III. This and other updates are available via Software Update or via Apple Downloads.

IV. Please send email to cert@cert.org with "TA07-352A Feedback VU#905292" in the subject.

For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.

Produced 2007 by US-CERT, a government organization.

Terms of use:

 <http://www.us-cert.gov/legal.html>

Revision History

December 18, 2007: Initial release

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBR2hR0fRFkHkM87XOAQL7Egf+NvQEwnN2IGDdDwMEb9C2RDw58FXq0EMZ 7SRO8qbrM0c+G3apLFlmCCivWpGHqms2hzrSeon/Ym1YstHQOQeoJANmsHA3SyKz Wx8TIG10jEiAgytMuyrYjf0w3alXBEsDgXcu8FRc5Z4dg7osMPe7Lco7vVfMvoZG IpEEQu98zxh2p+Vhf1XKr9UfUnkD4O88rRAs+M1oDZd46GH+JvkYLgLCmkMSwIcs Vi4M7J+KHUBBkaMZYjnp+YqRwNDq9sGskVEOVDMk9OXw7VhAR7Kf8/zo9Tt1h3P0 h9JeMBHHb0M0MEtYHx/7JxpleXS3LtyiL0kDb9cbMjxU0kKK9SKb/Q== =Y1jd -----END PGP SIGNATURE----- .

2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

TITLE: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA28136

VERIFY ADVISORY: http://secunia.com/advisories/28136/

CRITICAL: Highly critical

IMPACT: Hijacking, Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS, System access

WHERE:

From remote

OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/

DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) A format string error in the URL handler of Address Book can be exploited to execute arbitrary code when a user views a specially crafted web page.

2) An error in the handling of downloaded files in CFNetwork can be exploited via directory traversal attacks to automatically download files to arbitrary folders when a user is enticed to visit a specially crafted web page.

3) An unspecified error exists in ColorSync when processing images with an embedded ColorSync profile, which can be exploited to cause a memory corruption.

Successful exploitation may allow execution of arbitrary code.

4) A race condition exists in the "CFURLWriteDataAndPropertiesToResource" API, which can lead to files being created with insecure permissions.

5) A boundary error exists in the printer driver for CUPS.

6) A boundary error in CUPS can be exploited by malicious people to compromise a vulnerable system.

For more information: SA27233

7) An integer underflow error in the CUPS backend in the handling of SNMP responses can be exploited to cause a stack-based buffer overflow by sending a specially crafted SNMP response.

Successful exploitation allows execution of arbitrary code, but requires that SNMP is enabled.

8) A boundary error in Desktop Services can be exploited to cause a heap-based buffer overflow when a user opens a directory containing a specially crafted .DS_Store file.

Successful exploitation may allow execution of arbitrary code.

9) An input validation error in tar can be exploited by malicious people to compromise a user's system.

For more information: SA26573

10) An unspecified error in iChat can be exploited by malicious people on the local network to initiate a video connection without the user's approval.

11) An unspecified error exists within IO Storage Family when handling GUID partition maps within a disk image. This can be exploited to execute arbitrary code when a user is enticed to open a specially crafted disk image.

12) Launch Services does not handle HTML files as potentially unsafe content. This can be exploited to disclose sensitive information or conduct cross-site scripting attacks by enticing a user to open a specially crafted HTML file.

13) A vulnerability in Mail in the handling of unsafe file types can be exploited to compromise a user's system.

For more information: SA27785

14) An error in Mail can cause the application to default to SMTP plaintext authentication if the server supports only MD5 Challenge-Response authentication and plaintext authentication.

15) Some vulnerabilities in perl can be exploited by malicious people to compromise a vulnerable system.

For more information: SA27546

16) A security issue in python can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

For more information: SA26837

17) Plug-ins in Quick Look are not restricted from making network requests. This may lead to the disclosure of sensitive information when previewing an HTML file.

18) URLs contained in movie files may be accessed when creating an icon for a movie file or previewing a movie file using QuickLook.

19) Some security issues in ruby can be exploited by malicious people to conduct spoofing attacks.

For more information: SA26985

20) Some vulnerabilities and a security issue in Ruby on Rails can be exploited by malicious people to disclose sensitive information or to conduct session fixation attacks.

For more information: SA25699 SA27781

21) An error in Safari allows a page to navigate the subframes of any other page. This can be exploited to conduct cross-site scripting attacks and to disclose sensitive information when a user visits a specially crafted web page.

22) An unspecified error in Safari in the handling of RSS feeds can be exploited to cause a memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted URL.

23) Some boundary errors in Samba can be exploited by malicious people to compromise a vulnerable system.

For more information: SA27450

24) Some boundary errors in the Shockwave Plug-in can be exploited by malicious people to compromise a user's system.

For more information: SA19218

25) A boundary error in the processing of command line arguments to "mount_smbfs" and "smbutil" can be exploited to cause a stack-based buffer overflow and execute arbitrary code with system privileges.

26) The distribution definition file used in Software Update is received by using HTTP without any authentication and allows execution of arbitrary commands.

Successful exploitation requires a MitM (Man-in-the-Middle) attack.

27) An error due to an insecure file operation exists in the handling of output files in SpinTracer. This may allow a malicious, local user to execute arbitrary code with system privileges.

28) An unspecified error exists in the Microsoft Office Spotlight Importer, which can be exploited to cause a memory corruption when a user downloads a specially crafted .xls file.

Successful exploitation may allow execution of arbitrary code.

29) Some vulnerabilities in tcpdump can be exploited by malicious people to cause a DoS or to compromise a user's system.

For more information: SA24318 SA26135

30) Some vulnerabilities exist the Perl Compatible Regular Expressions (PCRE) library used by XQuery, which can potentially be exploited to compromise a vulnerable system.

For more information: SA27543

SOLUTION: Apply Security Update 2007-009.

Security Update 2007-009 (10.4.11 Universal): http://www.apple.com/support/downloads/securityupdate200700910411universal.html

Security Update 2007-009 (10.4.11 PPC): http://www.apple.com/support/downloads/securityupdate200700910411ppc.html

Security Update 2007-009 (10.5.1): http://www.apple.com/support/downloads/securityupdate20070091051.html

PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Sean Harding. 3) The vendor credits Tom Ferris, Adobe Secure Software Engineering Team (ASSET). 5) The vendor credits Dave Camp, Critical Path Software. 7) The vendor credits Wei Wang, McAfee Avert Labs. 12) The vendor credits Michal Zalewski, Google Inc. 15) The vendor credits Tavis Ormandy and Will Drewry, Google Security Team. 18) The vendor credits Lukhnos D. Liu, Lithoglyph Inc. 26) Moritz Jodeit. 27) The vendor credits Kevin Finisterre, DigitalMunition

ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307179

OTHER REFERENCES: SA19218: http://secunia.com/advisories/19218/

SA24318: http://secunia.com/advisories/24318/

SA25699: http://secunia.com/advisories/25699/

SA26135: http://secunia.com/advisories/26135/

SA26573: http://secunia.com/advisories/26573/

SA26837: http://secunia.com/advisories/26837/

SA26985: http://secunia.com/advisories/26985/

SA27233: http://secunia.com/advisories/27233/

SA27450: http://secunia.com/advisories/27450/

SA27543: http://secunia.com/advisories/27543/

SA27546: http://secunia.com/advisories/27546/

SA27781: http://secunia.com/advisories/27781/

SA27785: http://secunia.com/advisories/27785/

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

.

The Red Hat Security Team also found two flaws in CUPS 1.1.x where a malicious user on the local subnet could send a set of carefully crafted IPP packets to the UDP port in such a way as to cause CUPS to crash (CVE-2008-0597) or consume memory and lead to a CUPS crash (CVE-2008-0596).

Finally, another flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash (CVE-2008-0882).

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0596 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0597 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0886

Updated Packages:

Corporate 3.0: 71c1bd1c9099440da3e9afcfe4636525 corporate/3.0/i586/cups-1.1.20-5.16.C30mdk.i586.rpm a73fba38dbcf62fd4c64590e5d754126 corporate/3.0/i586/cups-common-1.1.20-5.16.C30mdk.i586.rpm 60b6e82788d5b0c51f68b0db44e31240 corporate/3.0/i586/cups-serial-1.1.20-5.16.C30mdk.i586.rpm 419d078e2df1396531c23cbbf2f2785d corporate/3.0/i586/libcups2-1.1.20-5.16.C30mdk.i586.rpm 064e5b42b27c90602bf8e7c47200bef8 corporate/3.0/i586/libcups2-devel-1.1.20-5.16.C30mdk.i586.rpm 5c363b9a8573a4ae3da5e654da34bae5 corporate/3.0/SRPMS/cups-1.1.20-5.16.C30mdk.src.rpm

Corporate 3.0/X86_64: c33aff1c5bab9bce22f7a018f2fbfe7d corporate/3.0/x86_64/cups-1.1.20-5.16.C30mdk.x86_64.rpm ba1cba41b479e332e8d43652af86756d corporate/3.0/x86_64/cups-common-1.1.20-5.16.C30mdk.x86_64.rpm 211561645f6743343a0a9189ecd8e24e corporate/3.0/x86_64/cups-serial-1.1.20-5.16.C30mdk.x86_64.rpm d1cb2198f9b73cfb5d2ae3d69bacf12c corporate/3.0/x86_64/lib64cups2-1.1.20-5.16.C30mdk.x86_64.rpm 104350956cda23c2e2f5bb05a22df9c7 corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.16.C30mdk.x86_64.rpm 5c363b9a8573a4ae3da5e654da34bae5 corporate/3.0/SRPMS/cups-1.1.20-5.16.C30mdk.src.rpm

To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com

Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHxGl7mqjQ0CJFipgRAgVuAJ9rJyJ0ysTKDyXgzUhz1Yl5SEP38wCg9SSt G00zNYjRErOH1eJ5lnnUNVs= =sKtb -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200712-0432",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.11"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.11"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.11"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rpath",
        "version": "1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "26910"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tom Ferris tommy@security-protocols.comDave CampMichal Zalewski lcamtuf@echelon.plKevin Finisterre dotslash@snosoft.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-5848",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.2,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2007-5848",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-29210",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-5848",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200712-230",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-29210",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service. Apple Mac OS X is prone to multiple security vulnerabilities. \nThese issues affect Mac OS X and various applications, including Address Book, CFNetwork, ColorSync, CoreFoundation, CUPS, Desktop Services, iChat, IO Storage Family, Launch Services, Mail, Quick Look, Safari, Safari RSS, SMB, Software Update, Spin Tracer, Spotlight, tcpdump, and XQuery. \nAttackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. \nApple Mac OS X 10.5.1 and prior versions are vulnerable to these issues. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\n1) A signedness error exists within the processing of ASN1 encoded\nstrings from SNMP responses. \n\nFor more information:\nSA28129\n\nThe vulnerability affects openSUSE 10.2 and 10.3 only. \n\nx86 Platform:\n\nopenSUSE 10.3:\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-1.2.12-22.6.i586.rpm\ne844b0c92d437c25e71c9be92c3d6ee4\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-client-1.2.12-22.6.i586.rpm\n7f3525adc1a7ab85f3650fd9adf69bc8\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-devel-1.2.12-22.6.i586.rpm\n88ea6ba071bd51ee23b87c5d13a551b6\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-libs-1.2.12-22.6.i586.rpm\n5a41077855e2e502d6c1cfb5e369ef8b\n\nopenSUSE 10.2:\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-1.2.7-12.9.i586.rpm\nc4163c0ad47db8221f9b1ea41bdbf259\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-client-1.2.7-12.9.i586.rpm\nb55019f39c36ea6ef3352635b7093705\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-devel-1.2.7-12.9.i586.rpm\nf83d6477eb8f1c2ed76ba1f4b896ced3\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/cups-libs-1.2.7-12.9.i586.rpm\n295394a3fdc59c155d1683a3084df888\n\nSUSE LINUX 10.1:\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-1.1.23-40.35.i586.rpm\na5efab6d27bc1262873d4b467e288bbd\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-client-1.1.23-40.35.i586.rpm\n69b85c943b27dccf4fd3c69072ee01de\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-devel-1.1.23-40.35.i586.rpm\n8ab20affa8deb5a6d75481e244935761\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/cups-libs-1.1.23-40.35.i586.rpm\n79005dc03c94da463a65b6313a06515e\n\nPower PC Platform:\n\nopenSUSE 10.3:\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-1.2.12-22.6.ppc.rpm\n63f5378c91584358555df660d128cc0f\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-client-1.2.12-22.6.ppc.rpm\n835d0e286f18d2fa5bba7fa6a0ecef60\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-devel-1.2.12-22.6.ppc.rpm\n47bf9d7837037bc8ea2394a3c63cdf2e\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-libs-1.2.12-22.6.ppc.rpm\n7421ec50af012b698f9f3e55b8dc15db\n\nopenSUSE 10.2:\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-1.2.7-12.9.ppc.rpm\nccabb5d2c72bc5fa707289b1d2529884\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-client-1.2.7-12.9.ppc.rpm\n06e88fbb162d9505027071cfb49c2981\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-devel-1.2.7-12.9.ppc.rpm\nfdd75eb988613f025a6882e509e6f8db\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/cups-libs-1.2.7-12.9.ppc.rpm\ncf062d8d41eddd7eef98fb9518db4f26\n\nSUSE LINUX 10.1:\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-1.1.23-40.35.ppc.rpm\n2abd05fc5936cb3b3c54af60dc9f4cce\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-client-1.1.23-40.35.ppc.rpm\ne503e321ae5683fe8ea66084616fe0f1\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-devel-1.1.23-40.35.ppc.rpm\n5c5c12e135f4f3a3dd752a24f165c80c\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/cups-libs-1.1.23-40.35.ppc.rpm\n17b18d3827777331560d97ff934f7a2b\n\nx86-64 Platform:\n\nopenSUSE 10.3:\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-1.2.12-22.6.x86_64.rpm\nf04e3ddc357e5c81e6db4170d2d773e7\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-client-1.2.12-22.6.x86_64.rpm\n8b91333502a71746b16a77369d062b33\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-devel-1.2.12-22.6.x86_64.rpm\n6599150352f49d5494125502a86d8930\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-libs-1.2.12-22.6.x86_64.rpm\nc1635a3dab2ddda61b1ea7ed835334f8\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-libs-32bit-1.2.12-22.6.x86_64.rpm\ne84064f49db1ec54dbf9247148d91ee7\n\nopenSUSE 10.2:\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-1.2.7-12.9.x86_64.rpm\na71b6141bac10ef6b32fd156e107afa6\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-client-1.2.7-12.9.x86_64.rpm\n971d1b6ed9965673b232c18c8c6897f0\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-devel-1.2.7-12.9.x86_64.rpm\ndcca8172ada73a69773b2be6e6b5a46e\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-libs-1.2.7-12.9.x86_64.rpm\ne418b6e5ab33453fabb81a0a64d72587\n\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/cups-libs-32bit-1.2.7-12.9.x86_64.rpm\n4c9bb5f870772967b8dcb6d47e4118c5\n\nSUSE LINUX 10.1:\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-1.1.23-40.35.x86_64.rpm\n56c999311218649e26f5e5b745f206de\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-client-1.1.23-40.35.x86_64.rpm\nf7f80373487516f8258f5d32497deade\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-devel-1.1.23-40.35.x86_64.rpm\n7b734519a2317ad3b706e2661c67fc3f\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-libs-1.1.23-40.35.x86_64.rpm\nfacfda468d147b872cd003cf38dd385d\n\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/cups-libs-32bit-1.1.23-40.35.x86_64.rpm\n48fdaa964afc64d86ebb59670a2100fb\n\nSources:\n\nopenSUSE 10.3:\n\nhttp://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/cups-1.2.12-22.6.src.rpm\ned83be3003be5537bdbf50274c6fea06\n\nopenSUSE 10.2:\nftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/cups-1.2.7-12.9.src.rpm\n9c0ba6d4e3c15b81642d65d5e5582ef2\n\nSUSE LINUX 10.1:\nftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/cups-1.1.23-40.35.src.rpm\nca0082ed490367ee4dba961dd1d5081f\n\nOpen Enterprise Server\n\nhttp://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html\n\nNovell Linux POS 9\n\nhttp://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html\n\nNovell Linux Desktop 9\n\nhttp://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html\n\nSUSE Linux Enterprise Server 10 SP1\n\nhttp://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html\n\nSUSE Linux Enterprise Desktop 10 SP1\n\nhttp://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html\n\nSUSE SLES 9\n\nhttp://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html\n\nORIGINAL ADVISORY:\nhttp://lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html\n\nOTHER REFERENCES:\nSA28129:\nhttp://secunia.com/advisories/28129/\n\nSA28136:\nhttp://secunia.com/advisories/28136/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nI. \n   Further details are available in the related vulnerability notes. These products include:\n     * Adobe Flash\n     * Adobe Shockwave\n     * GNU Tar\n\nII. Impact\n\n   The impacts of these vulnerabilities vary. Potential consequences\n   include arbitrary code execution, sensitive information disclosure,\n   surreptitious video conference initiation, and denial of service. \n\nIII. This and other updates are\n   available via Software Update or via Apple Downloads. \n\nIV. Please send\n   email to \u003ccert@cert.org\u003e with \"TA07-352A Feedback VU#905292\" in the\n   subject. \n _________________________________________________________________\n\n   For instructions on subscribing to or unsubscribing from this\n   mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n _________________________________________________________________\n\n   Produced 2007 by US-CERT, a government organization. \n\n   Terms of use:\n\n     \u003chttp://www.us-cert.gov/legal.html\u003e\n _________________________________________________________________\n\nRevision History\n\n   December 18, 2007: Initial release\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBR2hR0fRFkHkM87XOAQL7Egf+NvQEwnN2IGDdDwMEb9C2RDw58FXq0EMZ\n7SRO8qbrM0c+G3apLFlmCCivWpGHqms2hzrSeon/Ym1YstHQOQeoJANmsHA3SyKz\nWx8TIG10jEiAgytMuyrYjf0w3alXBEsDgXcu8FRc5Z4dg7osMPe7Lco7vVfMvoZG\nIpEEQu98zxh2p+Vhf1XKr9UfUnkD4O88rRAs+M1oDZd46GH+JvkYLgLCmkMSwIcs\nVi4M7J+KHUBBkaMZYjnp+YqRwNDq9sGskVEOVDMk9OXw7VhAR7Kf8/zo9Tt1h3P0\nh9JeMBHHb0M0MEtYHx/7JxpleXS3LtyiL0kDb9cbMjxU0kKK9SKb/Q==\n=Y1jd\n-----END PGP SIGNATURE-----\n. \n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nGet a free trial of the Secunia Vulnerability Intelligence Solutions:\nhttp://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv\n\n----------------------------------------------------------------------\n\nTITLE:\nApple Mac OS X Security Update Fixes Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28136\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28136/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nHijacking, Security Bypass, Cross Site Scripting, Exposure of system\ninformation, Exposure of sensitive information, Privilege escalation,\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nApple has issued a security update for Mac OS X, which fixes multiple\nvulnerabilities. \n\n1) A format string error in the URL handler of Address Book can be\nexploited to execute arbitrary code when a user views a specially\ncrafted web page. \n\n2) An error in the handling of downloaded files in CFNetwork can be\nexploited via directory traversal attacks to automatically download\nfiles to arbitrary folders when a user is enticed to visit a\nspecially crafted web page. \n\n3) An unspecified error exists in ColorSync when processing images\nwith an embedded ColorSync profile, which can be exploited to cause a\nmemory corruption. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n4) A race condition exists in the\n\"CFURLWriteDataAndPropertiesToResource\" API, which can lead to files\nbeing created with insecure permissions. \n\n5) A boundary error exists in the printer driver for CUPS. \n\n6) A boundary error in CUPS can be exploited by malicious people to\ncompromise a vulnerable system. \n\nFor more information:\nSA27233\n\n7) An integer underflow error in the CUPS backend in the handling of\nSNMP responses can be exploited to cause a stack-based buffer\noverflow by sending a specially crafted SNMP response. \n\nSuccessful exploitation allows execution of arbitrary code, but\nrequires that SNMP is enabled. \n\n8) A boundary error in Desktop Services can be exploited to cause a\nheap-based buffer overflow when a user opens a directory containing a\nspecially crafted .DS_Store file. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n9) An input validation error in tar can be exploited by malicious\npeople to compromise a user\u0027s system. \n\nFor more information:\nSA26573\n\n10) An unspecified error in iChat can be exploited by malicious\npeople on the local network to initiate a video connection without\nthe user\u0027s approval. \n\n11) An unspecified error exists within IO Storage Family when\nhandling GUID partition maps within a disk image. This can be\nexploited to execute arbitrary code when a user is enticed to open a\nspecially crafted disk image. \n\n12) Launch Services does not handle HTML files as potentially unsafe\ncontent. This can be exploited to disclose sensitive information or\nconduct cross-site scripting attacks by enticing a user to open a\nspecially crafted HTML file. \n\n13) A vulnerability in Mail in the handling of unsafe file types can\nbe exploited to compromise a user\u0027s system. \n\nFor more information:\nSA27785\n\n14) An error in Mail can cause the application to default to SMTP\nplaintext authentication if the server supports only MD5\nChallenge-Response authentication and plaintext authentication. \n\n15) Some vulnerabilities in perl can be exploited by malicious people\nto compromise a vulnerable system. \n\nFor more information:\nSA27546\n\n16) A security issue in python can be exploited by malicious people\nto cause a DoS (Denial of Service) and potentially compromise a\nvulnerable system. \n\nFor more information:\nSA26837\n\n17) Plug-ins in Quick Look are not restricted from making network\nrequests. This may lead to the disclosure of sensitive information\nwhen previewing an HTML file. \n\n18) URLs contained in movie files may be accessed when creating an\nicon for a movie file or previewing a movie file using QuickLook. \n\n19) Some security issues in ruby can be exploited by malicious people\nto conduct spoofing attacks. \n\nFor more information:\nSA26985\n\n20) Some vulnerabilities and a security issue in Ruby on Rails can be\nexploited by malicious people to disclose sensitive information or to\nconduct session fixation attacks. \n\nFor more information:\nSA25699\nSA27781\n\n21) An error in Safari allows a page to navigate the subframes of any\nother page. This can be exploited to conduct cross-site scripting\nattacks and to disclose sensitive information when a user visits a\nspecially crafted web page. \n\n22) An unspecified error in Safari in the handling of RSS feeds can\nbe exploited to cause a memory corruption and may allow execution of\narbitrary code when a user accesses a specially crafted URL. \n\n23) Some boundary errors in Samba can be exploited by malicious\npeople to compromise a vulnerable system. \n\nFor more information:\nSA27450\n\n24) Some boundary errors in the Shockwave Plug-in can be exploited by\nmalicious people to compromise a user\u0027s system. \n\nFor more information:\nSA19218\n\n25) A boundary error in the processing of command line arguments to\n\"mount_smbfs\" and \"smbutil\" can be exploited to cause a stack-based\nbuffer overflow and execute arbitrary code with system privileges. \n\n26) The distribution definition file used in Software Update is\nreceived by using HTTP without any authentication and allows\nexecution of arbitrary commands. \n\nSuccessful exploitation requires a MitM (Man-in-the-Middle) attack. \n\n27) An error due to an insecure file operation exists in the handling\nof output files in SpinTracer. This may allow a malicious, local user\nto execute arbitrary code with system privileges. \n\n28) An unspecified error exists in the Microsoft Office Spotlight\nImporter, which can be exploited to cause a memory corruption when a\nuser downloads a specially crafted .xls file. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n29) Some vulnerabilities in tcpdump can be exploited by malicious\npeople to cause a DoS or to compromise a user\u0027s system. \n\nFor more information:\nSA24318\nSA26135\n\n30) Some vulnerabilities exist the Perl Compatible Regular\nExpressions (PCRE) library used by XQuery, which can potentially be\nexploited to compromise a vulnerable system. \n\nFor more information:\nSA27543\n\nSOLUTION:\nApply Security Update 2007-009. \n\nSecurity Update 2007-009 (10.4.11 Universal):\nhttp://www.apple.com/support/downloads/securityupdate200700910411universal.html\n\nSecurity Update 2007-009 (10.4.11 PPC):\nhttp://www.apple.com/support/downloads/securityupdate200700910411ppc.html\n\nSecurity Update 2007-009 (10.5.1):\nhttp://www.apple.com/support/downloads/securityupdate20070091051.html\n\nPROVIDED AND/OR DISCOVERED BY:\n2) The vendor credits Sean Harding. \n3) The vendor credits Tom Ferris, Adobe Secure Software Engineering\nTeam (ASSET). \n5) The vendor credits Dave Camp, Critical Path Software. \n7) The vendor credits Wei Wang, McAfee Avert Labs. \n12) The vendor credits Michal Zalewski, Google Inc. \n15) The vendor credits Tavis Ormandy and Will Drewry, Google Security\nTeam. \n18) The vendor credits Lukhnos D. Liu, Lithoglyph Inc. \n26) Moritz Jodeit. \n27) The vendor credits Kevin Finisterre, DigitalMunition\n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=307179\n\nOTHER REFERENCES:\nSA19218:\nhttp://secunia.com/advisories/19218/\n\nSA24318:\nhttp://secunia.com/advisories/24318/\n\nSA25699:\nhttp://secunia.com/advisories/25699/\n\nSA26135:\nhttp://secunia.com/advisories/26135/\n\nSA26573:\nhttp://secunia.com/advisories/26573/\n\nSA26837:\nhttp://secunia.com/advisories/26837/\n\nSA26985:\nhttp://secunia.com/advisories/26985/\n\nSA27233:\nhttp://secunia.com/advisories/27233/\n\nSA27450:\nhttp://secunia.com/advisories/27450/\n\nSA27543:\nhttp://secunia.com/advisories/27543/\n\nSA27546:\nhttp://secunia.com/advisories/27546/\n\nSA27781:\nhttp://secunia.com/advisories/27781/\n\nSA27785:\nhttp://secunia.com/advisories/27785/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. \n \n The Red Hat Security Team also found two flaws in CUPS 1.1.x where\n a malicious user on the local subnet could send a set of carefully\n crafted IPP packets to the UDP port in such a way as to cause CUPS\n to crash (CVE-2008-0597) or consume memory and lead to a CUPS crash\n (CVE-2008-0596). \n \n Finally, another flaw was found in how CUPS handled the addition and\n removal of remote printers via IPP that could allow a remote attacker\n to send a malicious IPP packet to the UDP port causing CUPS to crash\n (CVE-2008-0882). \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5848\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0596\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0597\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0886\n _______________________________________________________________________\n \n Updated Packages:\n \n Corporate 3.0:\n 71c1bd1c9099440da3e9afcfe4636525  corporate/3.0/i586/cups-1.1.20-5.16.C30mdk.i586.rpm\n a73fba38dbcf62fd4c64590e5d754126  corporate/3.0/i586/cups-common-1.1.20-5.16.C30mdk.i586.rpm\n 60b6e82788d5b0c51f68b0db44e31240  corporate/3.0/i586/cups-serial-1.1.20-5.16.C30mdk.i586.rpm\n 419d078e2df1396531c23cbbf2f2785d  corporate/3.0/i586/libcups2-1.1.20-5.16.C30mdk.i586.rpm\n 064e5b42b27c90602bf8e7c47200bef8  corporate/3.0/i586/libcups2-devel-1.1.20-5.16.C30mdk.i586.rpm \n 5c363b9a8573a4ae3da5e654da34bae5  corporate/3.0/SRPMS/cups-1.1.20-5.16.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n c33aff1c5bab9bce22f7a018f2fbfe7d  corporate/3.0/x86_64/cups-1.1.20-5.16.C30mdk.x86_64.rpm\n ba1cba41b479e332e8d43652af86756d  corporate/3.0/x86_64/cups-common-1.1.20-5.16.C30mdk.x86_64.rpm\n 211561645f6743343a0a9189ecd8e24e  corporate/3.0/x86_64/cups-serial-1.1.20-5.16.C30mdk.x86_64.rpm\n d1cb2198f9b73cfb5d2ae3d69bacf12c  corporate/3.0/x86_64/lib64cups2-1.1.20-5.16.C30mdk.x86_64.rpm\n 104350956cda23c2e2f5bb05a22df9c7  corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.16.C30mdk.x86_64.rpm \n 5c363b9a8573a4ae3da5e654da34bae5  corporate/3.0/SRPMS/cups-1.1.20-5.16.C30mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.8 (GNU/Linux)\n\niD8DBQFHxGl7mqjQ0CJFipgRAgVuAJ9rJyJ0ysTKDyXgzUhz1Yl5SEP38wCg9SSt\nG00zNYjRErOH1eJ5lnnUNVs=\n=sKtb\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "db": "BID",
        "id": "26910"
      },
      {
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "db": "PACKETSTORM",
        "id": "62559"
      },
      {
        "db": "PACKETSTORM",
        "id": "62986"
      },
      {
        "db": "PACKETSTORM",
        "id": "61950"
      },
      {
        "db": "PACKETSTORM",
        "id": "61915"
      },
      {
        "db": "PACKETSTORM",
        "id": "64076"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-5848",
        "trust": 2.9
      },
      {
        "db": "SECUNIA",
        "id": "28136",
        "trust": 2.6
      },
      {
        "db": "USCERT",
        "id": "TA07-352A",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "26910",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "28636",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "28441",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "28344",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-4238",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "39096",
        "trust": 1.4
      },
      {
        "db": "USCERT",
        "id": "SA07-352A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043",
        "trust": 0.8
      },
      {
        "db": "NSFOCUS",
        "id": "11341",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "11310",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "11310\u203b11341",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20080105 RPSA-2008-0008-1 CUPS",
        "trust": 0.6
      },
      {
        "db": "SUSE",
        "id": "SUSE-SA:2008:002",
        "trust": 0.6
      },
      {
        "db": "SUSE",
        "id": "SUSE-SR:2008:002",
        "trust": 0.6
      },
      {
        "db": "MANDRIVA",
        "id": "MDVSA-2008:050",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "TA07-352A",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2007-12-17",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "64076",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-29210",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "62559",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "62986",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "61950",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "61915",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "db": "BID",
        "id": "26910"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "db": "PACKETSTORM",
        "id": "62559"
      },
      {
        "db": "PACKETSTORM",
        "id": "62986"
      },
      {
        "db": "PACKETSTORM",
        "id": "61950"
      },
      {
        "db": "PACKETSTORM",
        "id": "61915"
      },
      {
        "db": "PACKETSTORM",
        "id": "64076"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ]
  },
  "id": "VAR-200712-0432",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29210"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T10:45:30.076000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security Update 2007-009",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=307179-en"
      },
      {
        "title": "Security Update 2007-009",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=307179-ja"
      },
      {
        "title": "TA07-352A",
        "trust": 0.8,
        "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta07-352a.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.us-cert.gov/cas/techalerts/ta07-352a.html"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/28136"
      },
      {
        "trust": 1.8,
        "url": "http://docs.info.apple.com/article.html?artnum=307179"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2007/dec/msg00002.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/26910"
      },
      {
        "trust": 1.7,
        "url": "https://issues.rpath.com/browse/rpl-2009"
      },
      {
        "trust": 1.7,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:050"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/28344"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/28441"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/28636"
      },
      {
        "trust": 1.7,
        "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2007/4238"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/39096"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/485829/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/4238"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39096"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5848"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta07-352a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta07-352a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5848"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa07-352a.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/485829/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/11310\u203b11341"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/28136/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/16124/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/13375/"
      },
      {
        "trust": 0.2,
        "url": "https://psi.secunia.com/?page=changelog"
      },
      {
        "trust": 0.2,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/4118/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/28129/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/12192/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/10796/"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-client-1.2.12-22.6.x86_64.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-libs-32bit-1.2.12-22.6.x86_64.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-1.2.12-22.6.x86_64.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-devel-1.2.12-22.6.x86_64.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/cups-1.2.12-22.6.src.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-1.2.12-22.6.ppc.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-client-1.2.12-22.6.ppc.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-devel-1.2.12-22.6.i586.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-devel-1.2.12-22.6.ppc.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-1.2.12-22.6.i586.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4664/"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-client-1.2.12-22.6.i586.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/cups-libs-1.2.12-22.6.x86_64.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28441/"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/cups-libs-1.2.12-22.6.i586.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/cups-libs-1.2.12-22.6.ppc.rpm"
      },
      {
        "trust": 0.1,
        "url": "http://support.novell.com/techcenter/psdb/eb37a23ce60ab91ec04f08ea1e3aa56a.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28358/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1171/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2001/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28636/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28444/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27313/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28384/"
      },
      {
        "trust": 0.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00005.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2526/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28076/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28228/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28327/"
      },
      {
        "trust": 0.1,
        "url": "http://docs.info.apple.com/article.html?artnum=307179\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=apple-2007-009\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://docs.info.apple.com/article.html?artnum=106704\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta07-352a.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate200700910411universal.html"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26837/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24318/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27785/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27543/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate20070091051.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26135/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26985/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27450/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27546/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27233/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27781/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25699/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26573/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/19218/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate200700910411ppc.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0596"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0597"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0886"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0886"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5848"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0596"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0597"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "db": "BID",
        "id": "26910"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "db": "PACKETSTORM",
        "id": "62559"
      },
      {
        "db": "PACKETSTORM",
        "id": "62986"
      },
      {
        "db": "PACKETSTORM",
        "id": "61950"
      },
      {
        "db": "PACKETSTORM",
        "id": "61915"
      },
      {
        "db": "PACKETSTORM",
        "id": "64076"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "db": "BID",
        "id": "26910"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "db": "PACKETSTORM",
        "id": "62559"
      },
      {
        "db": "PACKETSTORM",
        "id": "62986"
      },
      {
        "db": "PACKETSTORM",
        "id": "61950"
      },
      {
        "db": "PACKETSTORM",
        "id": "61915"
      },
      {
        "db": "PACKETSTORM",
        "id": "64076"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "date": "2007-12-17T00:00:00",
        "db": "BID",
        "id": "26910"
      },
      {
        "date": "2008-01-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "date": "2008-01-12T01:30:53",
        "db": "PACKETSTORM",
        "id": "62559"
      },
      {
        "date": "2008-01-25T23:58:49",
        "db": "PACKETSTORM",
        "id": "62986"
      },
      {
        "date": "2007-12-20T00:43:04",
        "db": "PACKETSTORM",
        "id": "61950"
      },
      {
        "date": "2007-12-19T00:48:29",
        "db": "PACKETSTORM",
        "id": "61915"
      },
      {
        "date": "2008-02-27T00:21:01",
        "db": "PACKETSTORM",
        "id": "64076"
      },
      {
        "date": "2007-12-19T21:46:00",
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "date": "2007-11-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-29210"
      },
      {
        "date": "2008-01-07T14:19:00",
        "db": "BID",
        "id": "26910"
      },
      {
        "date": "2008-01-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      },
      {
        "date": "2018-10-15T21:46:49.957000",
        "db": "NVD",
        "id": "CVE-2007-5848"
      },
      {
        "date": "2007-12-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS X of  CUPS Vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001043"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200712-230"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.