Lucene search

K
certCERTVU:980084
HistoryMar 17, 2006 - 12:00 a.m.

Apple Mail buffer overflow vulnerability

2006-03-1700:00:00
www.kb.cert.org
13

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.45

Percentile

97.4%

Overview

Apple Mail contains a buffer overflow that may allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

Apple Mail

Mac OS X includes the Mail application (Mail.app) for handling electronic mail.

The Problem

Apple Mail contains a buffer overflow caused by lack of validation on MIME encapsulted files. The buffer overflow may be triggered when an email message with a specially crafted attachment is opened with Mail.

Considerations

According to public reports this vulnerability is introduced by Apple Security Update 2006-001.

Exploit code for this vulnerability is publicly available.


Impact

By convincing a user to open a specially crafted attachment, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running Mail.


Solution

Install an update****
This issue is corrected in Apple Security Update 2006-002.


Do not open attachments from untrusted sources

To protect against Only open email attachemnts from trusted or known sources.


Vendor Information

980084

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Apple Computer, Inc. __ Affected

Updated: March 15, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://docs.info.apple.com/article.html?artnum=303453&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23980084 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Kevin Finisterre.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0396
Severity Metric: 6.63 Date Public:

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.45

Percentile

97.4%