Format string vulnerability in Address Book in Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary code via the URL handler.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/4238 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA07-352A.html | third party advisory us government resource |
http://secunia.com/advisories/28136 | third party advisory |
http://www.securityfocus.com/bid/26910 | vdb entry |
http://securitytracker.com/id?1019106 | vdb entry |
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39092 | vdb entry |
http://docs.info.apple.com/article.html?artnum=307179 |