Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute arbitrary code via an AppleDouble attachment containing an apparently-safe file type and script in a resource fork, which does not warn the user that a separate program is going to be executed. NOTE: this is a regression error related to CVE-2006-0395.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/4238 | vdb entry vendor advisory |
http://www.us-cert.gov/cas/techalerts/TA07-352A.html | third party advisory us government resource |
http://www.kb.cert.org/vuls/id/433819 | third party advisory us government resource |
http://secunia.com/advisories/28136 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2007/3958 | vdb entry vendor advisory |
http://securitytracker.com/id?1019106 | vdb entry |
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html | vendor advisory |
http://docs.info.apple.com/article.html?artnum=307179 | |
http://secunia.com/advisories/27785 | third party advisory vendor advisory |
http://www.heise-security.co.uk/news/99257 | vendor advisory |
http://www.securityfocus.com/bid/26510 | vdb entry exploit |