{"vuid":"VU#566875","idnumber":"566875","name":"Apple Help Viewer vulnerable to buffer overflow","keywords":["Apple","Help Viewer","buffer overflow","integer overflow","help:topic URLs","apple_security_update_2008_003"],"overview":"A vulnerability in the way Apple Help Viewer handles specially crafted URLs may allow an attacker to execute arbitrary code or cause a denial of service.","clean_desc":"According to  Apple Security Update 2008-003: An integer underflow in Help Viewer's handling of help:topic URLs may result in a buffer overflow. Accessing a malicious help:topic URL may lead to an unexpected application termination or arbitrary code execution. Note that this issue affects systems running Mac OS X prior to version 10.5.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.","resolution":"Apply Update\nThis issue is addressed in Apple Security Update 2008-003. An update for Mac OS X is available on Apple Downloads and via Software Update.","workarounds":"","sysaffected":"","thanks":"This issue was reported in Apple Security Update \n2008-003\n. Apple credits\n Paul Haddad of PTH with reporting this issue.","author":"This document was written by Chris Taschner.","public":["h","t","t","p",":","/","/","l","i","s","t","s",".","a","p","p","l","e",".","c","o","m","/","a","r","c","h","i","v","e","s","/","s","e","c","u","r","i","t","y","-","a","n","n","o","u","n","c","e","/","2","0","0","8","/","M","a","y","/","m","s","g","0","0","0","0","1",".","h","t","m","l"],"cveids":["CVE-2008-1034"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-05-29T13:30:52Z","publicdate":"2008-05-28T00:00:00Z","datefirstpublished":"2008-05-29T19:00:55Z","dateupdated":"2008-05-29T19:01:22Z","revision":6,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"6","cam_population":"12","cam_impact":"17","cam_easeofexploitation":"9","cam_attackeraccessrequired":"12","cam_scorecurrent":"8.6751","cam_scorecurrentwidelyknown":"10.7406","cam_scorecurrentwidelyknownexploited":"19.0026","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.6751,"vulnote":null}