CVE-2007-1071 : Détail

CVE-2007-1071

49.84%V4
Network
2007-02-22
21h00 +00:00
2007-03-21
08h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Integer overflow in the gifGetBandProc function in ImageIO in Apple Mac OS X 10.4.8 allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image that triggers the overflow during decompression. NOTE: this is a different issue than CVE-2006-3502 and CVE-2006-3503.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.8 AV:N/AC:L/Au:N/C:N/I:N/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 29620

Date de publication : 2007-02-19 23h00 +00:00
Auteur : Tom Ferris
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/22630/info Apple Mac OS X ImageIO is prone to an integer-overflow vulnerability because it fails to handle specially crafted image files. A remote attacker can exploit this issue to cause denial-of-service conditions and potentially to execute code, but this has not been confirmed. This issue affects Mac OS X 10.4.8; previous versions may also be affected. Release Date: February 19th, 2007 Severity: High Vendor: Apple Versions Affected: OSX 10.4.8 Overview: An integer overflow vulnerability exists within ImageIO when processing a malformed .gif file. This allows for an attacker to cause the application to crash, and or to execute arbitrary code on the targeted host. Technical Details: When decompressing a specially crafted .gif file, the gifGetBandProc function within ImageIO incorrectly parses the malformed data causing the application to segmentation fault. Below the crash is triggered on OS X 10.4.8 using Safari: Program received signal EXC_BAD_ACCESS, Could not access memory. Reason: KERN_INVALID_ADDRESS at address: 0x3991b000 0x918f2dc5 in gifGetBandProc () (gdb) bt #0 0x918f2dc5 in gifGetBandProc () #1 0x918ec8ea in CGImagePlusUpdateCache () #2 0x918ec606 in CGImagePlusCreateImage () #3 0x952356c0 in -[WebImageData _cacheImages:allImages:] () #4 0x952355f3 in -[WebImageData imageAtIndex:] () Thread 0 crashed with i386 Thread State: eax: 0x396e2000 ebx: 0x918f2bcc ecx:0x00000033 edx: 0x00027f84 edi: 0x15fb9ad0 esi: 0x00000033 ebp:0xbfffd5d8 esp: 0xbfffd140 ss: 0x0000002f efl: 0x00010206 eip:0x918f2db7 cs: 0x00000027 ds: 0x0000002f es: 0x0000002f fs:0x00000000 gs: 0x00000037 Vendor Status: Apple was notified on 9/8/2006 Discovered by: Tom Ferris tommy[at]security-protocols[dot]com https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29620-1.gif https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29620-2.gif

Products Mentioned

Configuraton 0

Apple>>Mac_os_x >> Version 10.4.8

Apple>>Mac_os_x_server >> Version 10.4.8

Références

http://www.securityfocus.com/bid/22630
Tags : vdb-entry, x_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Tags : third-party-advisory, x_refsource_CERT
http://www.osvdb.org/34854
Tags : vdb-entry, x_refsource_OSVDB
http://www.kb.cert.org/vuls/id/559444
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.vupen.com/english/advisories/2007/0930
Tags : vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1017758
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/24479
Tags : third-party-advisory, x_refsource_SECUNIA