{"vuid":"VU#124280","idnumber":"124280","name":"Apple Mac OS X fails to properly handle crafted AppleSingleEncoding disk images","keywords":["Apple","Mac OS X","diskimages-helper","DoS","denial of service","arbitrary code execution","compressed disk images","apple_2007-003"],"overview":"A vulnerabilty in the Apple Mac OS X AppleSingleEncoding disk image handler may allow execution of arbitrary code or denial of service.","clean_desc":"Apple Mac OS X contains a vulnerability that may be exploited when a user mounts a specially crafted AppleSingleEncoding disk image file. According to Apple security document 305214 : An integer overflow vulnerability exists in the handler for AppleSingleEncoding disk images. By enticing a local user to open a maliciously-crafted disk image, an attacker could trigger the overflow which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of AppleSingleEncoding disk images.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition. The crafted AppleSingleEncoding disk image may be supplied on a webpage or in email for the victim to select, or by some other means designed to encourage them to mount the exploit file.","resolution":"Upgrade Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. See Apple Security Update 2007-003 for more details.","workarounds":"Do not open untrusted Apple disk images Do not open unfamiliar or unexpected Apple disk images, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Disable \"Open 'safe' files after downloading\" Disable the option \"Open 'safe' files after downloading,\" as specified in the Securing Your Web Browser document. This will help prevent automatic exploitation of this and other vulnerabilities.","sysaffected":"","thanks":"This vulnerability was reported in Apple Security Update \n2007-003","author":"This document was written by Chris Taschner.","public":["http://docs.info.apple.com/article.html?artnum=305214","http://secunia.com/advisories/24479/"],"cveids":["CVE-2007-0722"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-03-13T20:59:21Z","publicdate":"2007-03-13T00:00:00Z","datefirstpublished":"2007-03-16T12:41:00Z","dateupdated":"2007-03-16T12:41:27Z","revision":20,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"18","cam_scorecurrentwidelyknown":"22.5","cam_scorecurrentwidelyknownexploited":"40.5","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.0,"vulnote":null}