Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/17081 | exploit vdb entry patch |
http://www.osvdb.org/23872 | vdb entry |
http://www.vupen.com/english/advisories/2006/0949 | vdb entry |
http://securitytracker.com/id?1015762 | vdb entry patch |
http://www.kb.cert.org/vuls/id/980084 | third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25209 | vdb entry |
http://secunia.com/advisories/19129 | third party advisory patch vendor advisory |
http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt | exploit vendor advisory |
http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html | vendor advisory |
http://docs.info.apple.com/article.html?artnum=303453 | |
http://www.securityfocus.com/archive/1/427601/100/0/threaded | mailing list |