{"vuid":"VU#346656","idnumber":"346656","name":"Apple Mac OS X fails to properly handle corrupted Universal Mach-O Binaries","keywords":["Apple","Mac OS X","memory corruption","arbitrary code execution","Universal Binaries","apple_2007-003"],"overview":"A vulnerability in the way Apple Mac OS X handles corrupted Universal Mach-O Binaries may result in execution of arbitrary code or denial of service.","clean_desc":"Apple Mac OS X uses the Mach-O file format's ability to support more than one type of machine code to create Mac OS X Universal binaries. Apple Mac OS X contains a vulnerability in the way corrupted Universal Mach-O Binaries are handled. According to Apple Security Update 2007-003: An integer overflow vulnerability exists in the loading of Universal Mach-O binaries. This could allow a malicious local user to cause a kernel panic or to obtain system privileges. This has been described on the Month of Kernel Bugs web site (MOKB-26-11-2006). This update addresses the issue by performing additional validation of Universal binaries. We are aware of publicly available proof-of-concept code that demonstrates this vulnerability.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with kernel privileges or cause a denial of service.","resolution":"Upgrade Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. See Apple Security Update 2007-003 for more details.","workarounds":"Disable Open “safe” files after downloading option For instructions on how to disable the Open “safe” files after downloading option in Safari, please refer to the Safari section of the Securing Your Web Browser document. Do not access Universal Binary files from untrusted sources Do not download Universal Binary files from unknown or untrusted sources. Do not open unfamiliar or unexpected links, particularly those delivered in email messages. Please see Cyber Security Tip ST04-014.","sysaffected":"","thanks":"This issue was reported in Month of Kernal Bugs\n MOKB-26-11-2006\n by LMH.","author":"This document was written by Chris Taschner.","public":["http://projects.info-pull.com/mokb/MOKB-26-11-2006.html","http://projects.info-pull.com/mokb/bug-files/MOKB-26-11-2006.bz2","http://secunia.com/advisories/23088/","http://docs.info.apple.com/article.html?artnum=305214","http://secunia.com/advisories/24479/","http://securitytracker.com/alerts/2007/Mar/1017751.html","http://www.securityfocus.com/bid/21291"],"cveids":["CVE-2006-6129"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-27T13:58:42Z","publicdate":"2006-11-26T00:00:00Z","datefirstpublished":"2007-03-14T18:42:14Z","dateupdated":"2007-03-30T22:26:04Z","revision":27,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.1","cam_scorecurrentwidelyknown":"21.375","cam_scorecurrentwidelyknownexploited":"38.475","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.1,"vulnote":null}