{"vuid":"VU#367424","idnumber":"367424","name":"Apple Mac OS X fails to properly handle corrupted DMG image structures","keywords":["Apple","Mac OS","X","memory corruption","arbitrary code execution","com.apple.AppleDiskImageController","DMG image structures","apple_2007-003"],"overview":"Apple Mac OS X fails to properly handle corrupted DMG image structures. The complete impact of this vulnerability is unclear, but may include execution of arbitrary code or denial of service.","clean_desc":"A vulnerability in the way Mac OS X com.apple.AppleDiskImageController handles malformed DMG files could lead to a memory corruption. We are aware of publicly available proof-of-concept code that demonstrates this vulnerability.","impact":"The complete impact of this vulnerability is unclear, but may include execution of arbitrary code or denial of service.","resolution":"Upgrade Apple has issued an upgrade to address this issue. See Apple Security Update 2007-003 for more details.","workarounds":"Disable Open “safe” files after downloading option For instructions on how to disable the Open “safe” files after downloading option in Safari, please refer to the Safari section of the Securing Your Web Browser document. Do not access DMG files from untrusted sources Do not download DMG files from unknown or untrusted sources. Do not open unfamiliar or unexpected links, particularly those delivered in email messages. Please see Cyber Security Tip ST04-014.","sysaffected":"","thanks":"This issue was reported in Month of Kernel Bugs \nMOKB-20-11-2006\n by LMH.","author":"This document was written by Chris Taschner.","public":["http://projects.info-pull.com/mokb/MOKB-20-11-2006.html","http://secunia.com/advisories/23012/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6061","http://docs.info.apple.com/article.html?artnum=305214","http://secunia.com/advisories/24479/","http://securitytracker.com/alerts/2007/Mar/1017751.html","http://www.securityfocus.com/bid/21201"],"cveids":["CVE-2006-6061"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-20T23:34:17Z","publicdate":"2006-11-20T00:00:00Z","datefirstpublished":"2006-11-22T16:01:02Z","dateupdated":"2007-03-20T13:57:43Z","revision":33,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"12","cam_population":"15","cam_impact":"13","cam_easeofexploitation":"9","cam_attackeraccessrequired":"18","cam_scorecurrent":"15.9924375","cam_scorecurrentwidelyknown":"18.954","cam_scorecurrentwidelyknownexploited":"30.80025","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":15.9924375,"vulnote":null}