{"vuid":"VU#214040","idnumber":"214040","name":"Apple Mac OS X fails to properly handle corrupted UDTO HFS+ image structures","keywords":["Apple","Mac","OS X","DoS","denial of service","memory corruption","UDTO HFS+ image structures","apple_2007-003"],"overview":"Apple Mac OS X fails to properly handle corrupted UDTO HFS+ image structures. This vulnerability may allow an attacker to cause a denial-of-service condition.","clean_desc":"Hierarchical File System (HFS+) is a file system that supports files that use 32-bit block addresses and Unicode file and folder naming conventions. UDTO is a format specification used to create DVD/CD-R master disk images. A vulnerability exists in the way Mac OS X handles corrupted UDTO HFS+ image structures. This vulnerability could lead to memory corruption. We are aware of publicly available proof-of-concept code that demonstrates this vulnerability.","impact":"A remote, unauthenticated attacker may be able to cause a denial-of-service condition.","resolution":"Apply an upgrade\nApple has issued an upgrade to address this issue. See Apple Security Update 2007-003 for more details.","workarounds":"Disable the \"Open 'safe' files after downloading\" option For instructions on how to disable the \"Open 'safe' files after downloading\" option in Safari, please refer to the Safari section of the Securing Your Web Browser document. Do not access DMG files from untrusted sources Do not download DMG files from unknown or untrusted sources. Do not open unfamiliar or unexpected links, particularly those delivered in email messages. Please see Cyber Security Tip ST04-014.","sysaffected":"","thanks":"This issue was reported in Month of Kernal Bugs \nMOKB-21-11-2006\n by LMH.","author":"This document was written by Chris Taschner.","public":["http://projects.info-pull.com/mokb/MOKB-21-11-2006.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6062","http://secunia.com/advisories/23062/","http://docs.info.apple.com/article.html?artnum=305214","http://en.wikipedia.org/wiki/HFS_Plus","http://secunia.com/advisories/24479/","http://securitytracker.com/alerts/2007/Mar/1017751.html","http://www.securityfocus.com/bid/21236","http://www.securityfocus.com/bid/21201"],"cveids":["CVE-2006-6062"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-22T02:53:08Z","publicdate":"2006-11-21T00:00:00Z","datefirstpublished":"2007-03-13T21:40:23Z","dateupdated":"2007-03-22T19:28:29Z","revision":26,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"5.56875","cam_scorecurrentwidelyknown":"6.834375","cam_scorecurrentwidelyknownexploited":"11.896875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.56875,"vulnote":null}