{"vuid":"VU#515792","idnumber":"515792","name":"Apple Mac OS X DMG UFS byte_swap_sbin() function Integer Overflow","keywords":["Apple","Mac","OS X","integer overflow","DMG","UFS","byte_swap_sbin","apple_2007-003"],"overview":"The Apple Mac OS X byte_swap_sbin() function contains an integer overflow vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.","clean_desc":"DMG files are disk images that can contain a variety of filesystems. Apple Mac OS X contains an integer overflow vulnerability in the byte_swap_bin() function in the UFS filesystem handling code.","impact":"By convincing a user to mount a specially-crafted DMG file, such as by viewing a web page with Safari, a remote, unauthenticated attacker may be able to execute code with the privileges of the user or cause a denial-of-service condition. Note that it is reported that it is unlikely that code execution can take place as a result of this vulnerability.","resolution":"Apply an update Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. See Apple Security Update 2007-003 for more details.","workarounds":"Do not open untrusted Apple disk images Do not open unfamiliar or unexpected Apple disk images, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Disable \"Open 'safe' files after downloading\" in Safari Disable the option \"Open 'safe' files after downloading\" in Safari, as specified in the Securing Your Web Browser document. This will help prevent automatic exploitation of this and other vulnerabilities.","sysaffected":"","thanks":"This vulnerability was publicly reported by LMH.","author":"This document was written by Will Dormann.","public":["http://projects.info-pull.com/moab/MOAB-11-01-2007.html","http://docs.info.apple.com/article.html?artnum=305214","http://www.securityfocus.com/bid/21980","http://secunia.com/advisories/23725/","http://secunia.com/advisories/24479/"],"cveids":["CVE-2007-0299"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-12T11:56:05Z","publicdate":"2007-01-11T00:00:00Z","datefirstpublished":"2007-03-15T21:13:13Z","dateupdated":"2007-03-15T21:13:53Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"11","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"17","cam_scorecurrent":"7.0125","cam_scorecurrentwidelyknown":"7.0125","cam_scorecurrentwidelyknownexploited":"12.6225","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.0125,"vulnote":null}