CVE-2006-0396
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/03/2006
Last modified:
03/04/2025
Description
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.
Impact
Base Score 2.0
5.10
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://docs.info.apple.com/article.html?artnum=303453
- http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html
- http://secunia.com/advisories/19129
- http://securitytracker.com/id?1015762=
- http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt
- http://www.kb.cert.org/vuls/id/980084
- http://www.osvdb.org/23872
- http://www.securityfocus.com/archive/1/427601/100/0/threaded
- http://www.securityfocus.com/bid/17081
- http://www.vupen.com/english/advisories/2006/0949
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25209
- http://docs.info.apple.com/article.html?artnum=303453
- http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html
- http://secunia.com/advisories/19129
- http://securitytracker.com/id?1015762=
- http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt
- http://www.kb.cert.org/vuls/id/980084
- http://www.osvdb.org/23872
- http://www.securityfocus.com/archive/1/427601/100/0/threaded
- http://www.securityfocus.com/bid/17081
- http://www.vupen.com/english/advisories/2006/0949
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25209



