CVE-2006-6129 : Detail

CVE-2006-6129

0.49%V4
Local
2006-11-26
23h00 +00:00
2017-07-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Integer overflow in the fatfile_getarch2 in Apple Mac OS X allows local users to cause a denial of service and possibly execute arbitrary code via a crafted Mach-O Universal program that triggers memory corruption.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 29190

Publication date : 2006-11-25 23h00 +00:00
Author : LMH
EDB Verified : Yes

source: https://www.securityfocus.com/bid/21291/info Apple Mac OS X is prone to a local integer-overflow vulnerability. This issue occurs when the operating system fails to handle specially crafted binaries. A successful exploit would allow a local attacker to execute arbitrary code with kernel-level privileges, leading to the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29190.bz2

Products Mentioned

Configuraton 0

Apple>>Mac_os_x >> Version 10.4.8

Apple>>Mac_os_x_server >> Version 10.4.8

References

http://www.osvdb.org/30706
Tags : vdb-entry, x_refsource_OSVDB
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Tags : third-party-advisory, x_refsource_CERT
http://www.vupen.com/english/advisories/2006/4714
Tags : vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/21291
Tags : vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1017751
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/23088
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/0930
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/24479
Tags : third-party-advisory, x_refsource_SECUNIA