CVE-2006-1983
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
21/04/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Multiple heap-based buffer overflows in Mac OS X 10.4.6 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) PredictorVSetField function for TIFF or (2) CFAllocatorAllocate function for GIF, as used in applications that use ImageIO or AppKit. NOTE: the BMP vector has been re-assigned to CVE-2006-2238 because it affects a separate product family.
Impacto
Puntuación base 2.0
6.40
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
- http://secunia.com/advisories/19686
- http://secunia.com/advisories/20077
- http://securitytracker.com/id?1016067=
- http://www.osvdb.org/24821
- http://www.osvdb.org/24822
- http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233
- http://www.security-protocols.com/sp-x28-advisory.php
- http://www.security-protocols.com/sp-x30-advisory.php
- http://www.securityfocus.com/bid/17634
- http://www.securityfocus.com/bid/17951
- http://www.us-cert.gov/cas/techalerts/TA06-132A.html
- http://www.vupen.com/english/advisories/2006/1452
- http://www.vupen.com/english/advisories/2006/1779
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25949
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25951
- http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
- http://secunia.com/advisories/19686
- http://secunia.com/advisories/20077
- http://securitytracker.com/id?1016067=
- http://www.osvdb.org/24821
- http://www.osvdb.org/24822
- http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233
- http://www.security-protocols.com/sp-x28-advisory.php
- http://www.security-protocols.com/sp-x30-advisory.php
- http://www.securityfocus.com/bid/17634
- http://www.securityfocus.com/bid/17951
- http://www.us-cert.gov/cas/techalerts/TA06-132A.html
- http://www.vupen.com/english/advisories/2006/1452
- http://www.vupen.com/english/advisories/2006/1779
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25949
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25951