Описание
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-0396
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25209
- http://docs.info.apple.com/article.html?artnum=303453
- http://lists.apple.com/archives/security-announce/2006/Mar/msg00001.html
- http://secunia.com/advisories/19129
- http://securitytracker.com/id?1015762
- http://www.digitalmunition.com/DMA%5B2006-0313a%5D.txt
- http://www.kb.cert.org/vuls/id/980084
- http://www.osvdb.org/23872
- http://www.securityfocus.com/archive/1/427601/100/0/threaded
- http://www.securityfocus.com/bid/17081
- http://www.vupen.com/english/advisories/2006/0949
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.
EPSS