Format string vulnerability in mDNSResponderHelper in Apple Mac OS X 10.5.2 allows local users to execute arbitrary code via format string specifiers in the local hostname.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/28304 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA08-079A.html | third party advisory us government resource |
http://www.vupen.com/english/advisories/2008/0924/references | vdb entry |
http://secunia.com/advisories/29420 | third party advisory |
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41292 | vdb entry |
http://docs.info.apple.com/article.html?artnum=307562 | |
http://www.securitytracker.com/id?1019662 | vdb entry |
http://www.securityfocus.com/bid/28339 | vdb entry |