CVE-2006-1983

Multiple heap-based buffer overflows in Mac OS X 10.4.6 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) PredictorVSetField function for TIFF or (2) CFAllocatorAllocate function for GIF, as used in applications that use ImageIO or AppKit. NOTE: the BMP vector has been re-assigned to CVE-2006-2238 because it affects a separate product family.
References
Link Resource
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html Patch
http://secunia.com/advisories/19686 Vendor Advisory
http://secunia.com/advisories/20077 Patch Vendor Advisory
http://securitytracker.com/id?1016067 Patch
http://www.osvdb.org/24821
http://www.osvdb.org/24822
http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233 Exploit
http://www.security-protocols.com/sp-x28-advisory.php Vendor Advisory
http://www.security-protocols.com/sp-x30-advisory.php Vendor Advisory
http://www.securityfocus.com/bid/17634 Exploit
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-132A.html Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/1452 Vendor Advisory
http://www.vupen.com/english/advisories/2006/1779 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25949
https://exchange.xforce.ibmcloud.com/vulnerabilities/25951
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html Patch
http://secunia.com/advisories/19686 Vendor Advisory
http://secunia.com/advisories/20077 Patch Vendor Advisory
http://securitytracker.com/id?1016067 Patch
http://www.osvdb.org/24821
http://www.osvdb.org/24822
http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233 Exploit
http://www.security-protocols.com/sp-x28-advisory.php Vendor Advisory
http://www.security-protocols.com/sp-x30-advisory.php Vendor Advisory
http://www.securityfocus.com/bid/17634 Exploit
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-132A.html Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/1452 Vendor Advisory
http://www.vupen.com/english/advisories/2006/1779 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25949
https://exchange.xforce.ibmcloud.com/vulnerabilities/25951
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html - Patch () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html - Patch
References () http://secunia.com/advisories/19686 - Vendor Advisory () http://secunia.com/advisories/19686 - Vendor Advisory
References () http://secunia.com/advisories/20077 - Patch, Vendor Advisory () http://secunia.com/advisories/20077 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1016067 - Patch () http://securitytracker.com/id?1016067 - Patch
References () http://www.osvdb.org/24821 - () http://www.osvdb.org/24821 -
References () http://www.osvdb.org/24822 - () http://www.osvdb.org/24822 -
References () http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233 - Exploit () http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233 - Exploit
References () http://www.security-protocols.com/sp-x28-advisory.php - Vendor Advisory () http://www.security-protocols.com/sp-x28-advisory.php - Vendor Advisory
References () http://www.security-protocols.com/sp-x30-advisory.php - Vendor Advisory () http://www.security-protocols.com/sp-x30-advisory.php - Vendor Advisory
References () http://www.securityfocus.com/bid/17634 - Exploit () http://www.securityfocus.com/bid/17634 - Exploit
References () http://www.securityfocus.com/bid/17951 - () http://www.securityfocus.com/bid/17951 -
References () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - Patch, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - Patch, Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2006/1452 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1452 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/1779 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1779 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25949 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25949 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25951 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25951 -

Information

Published : 2006-04-21 22:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-1983

Mitre link : CVE-2006-1983

CVE.ORG link : CVE-2006-1983


JSON object : View

Products Affected

apple

  • mac_os_x
  • mac_os_x_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer