CVE-2006-1985

Heap-based buffer overflow in BOM BOMArchiveHelper 10.4 (6.3) Build 312, as used in Mac OS X 10.4.6 and earlier, allows user-assisted attackers to execute arbitrary code via a crafted archive (such as ZIP) that contains long path names, which triggers an error in the BOMStackPop function.
References
Link Resource
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html Patch
http://secunia.com/advisories/19686 Vendor Advisory
http://secunia.com/advisories/20077 Patch Vendor Advisory
http://securitytracker.com/id?1016082
http://www.osvdb.org/24819
http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233
http://www.security-protocols.com/sp-x25-advisory.php Patch Vendor Advisory
http://www.securityfocus.com/bid/17634
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-132A.html Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/1452 Vendor Advisory
http://www.vupen.com/english/advisories/2006/1779 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25945
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html Patch
http://secunia.com/advisories/19686 Vendor Advisory
http://secunia.com/advisories/20077 Patch Vendor Advisory
http://securitytracker.com/id?1016082
http://www.osvdb.org/24819
http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233
http://www.security-protocols.com/sp-x25-advisory.php Patch Vendor Advisory
http://www.securityfocus.com/bid/17634
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-132A.html Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/1452 Vendor Advisory
http://www.vupen.com/english/advisories/2006/1779 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25945
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html - Patch () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html - Patch
References () http://secunia.com/advisories/19686 - Vendor Advisory () http://secunia.com/advisories/19686 - Vendor Advisory
References () http://secunia.com/advisories/20077 - Patch, Vendor Advisory () http://secunia.com/advisories/20077 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1016082 - () http://securitytracker.com/id?1016082 -
References () http://www.osvdb.org/24819 - () http://www.osvdb.org/24819 -
References () http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233 - () http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233 -
References () http://www.security-protocols.com/sp-x25-advisory.php - Patch, Vendor Advisory () http://www.security-protocols.com/sp-x25-advisory.php - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/17634 - () http://www.securityfocus.com/bid/17634 -
References () http://www.securityfocus.com/bid/17951 - () http://www.securityfocus.com/bid/17951 -
References () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - Patch, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - Patch, Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2006/1452 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1452 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/1779 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1779 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25945 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25945 -

Information

Published : 2006-04-21 22:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-1985

Mitre link : CVE-2006-1985

CVE.ORG link : CVE-2006-1985


JSON object : View

Products Affected

apple

  • mac_os_x_server
  • safari
  • mac_os_x
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer