var-200701-0516
Vulnerability from variot

Format string vulnerability in Apple iChat 3.1.6 allows remote attackers to cause a denial of service (null pointer dereference and application crash) and possibly execute arbitrary code via format string specifiers in an aim:// URI. Apple iChat contains a format string vulnerability. This vulnerability may allow a remote, unauthenticated attacker to execute arbitary code. A vulnerability in the way Apple Mac OS X handles corrupted Universal Mach-O Binaries may result in execution of arbitrary code or denial of service. Apple iChat is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function. Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the application and to compromise affected computers.


To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German.

The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios.

The vulnerability exists due to an error in the "fpathconf()" syscall when it is called with an unsupported file type and can be exploited to cause a system panic.

The vulnerability is confirmed in version 10.4.8.

SOLUTION: Grant only trusted users access to affected systems.

PROVIDED AND/OR DISCOVERED BY: Initially discovered in FreeBSD and reported in Mac OS X by Ilja Van Sprundel.

ORIGINAL ADVISORY: http://projects.info-pull.com/mokb/MOKB-09-11-2006.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0516",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 2.4,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "ichat",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "apple",
        "version": "3.1.6"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.3.x"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.x"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.3.x"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.x"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "BID",
        "id": "22146"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "LMH",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-0021",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2007-0021",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-23383",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-0021",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#794752",
            "trust": 0.8,
            "value": "11.85"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#346656",
            "trust": 0.8,
            "value": "17.10"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#765096",
            "trust": 0.8,
            "value": "5.18"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-0021",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200701-384",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-23383",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23383"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Format string vulnerability in Apple iChat 3.1.6 allows remote attackers to cause a denial of service (null pointer dereference and application crash) and possibly execute arbitrary code via format string specifiers in an aim:// URI. Apple iChat contains a format string vulnerability. This vulnerability may allow a remote, unauthenticated attacker to execute arbitary code. A vulnerability in the way Apple Mac OS X handles corrupted Universal Mach-O Binaries may result in execution of arbitrary code or denial of service. Apple iChat is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function. \nSuccessfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the application and to compromise affected computers. \n\n----------------------------------------------------------------------\n\nTo improve our services to our customers, we have made a number of\nadditions to the Secunia Advisories and have started translating the\nadvisories to German. \n\nThe improvements will help our customers to get a better\nunderstanding of how we reached our conclusions, how it was rated,\nour thoughts on exploitation, attack vectors, and scenarios. \n\nThe vulnerability exists due to an error in the \"fpathconf()\" syscall\nwhen it is called with an unsupported file type and can be exploited\nto cause a system panic. \n\nThe vulnerability is confirmed in version 10.4.8. \n\nSOLUTION:\nGrant only trusted users access to affected systems. \n\nPROVIDED AND/OR DISCOVERED BY:\nInitially discovered in FreeBSD and reported in Mac OS X by Ilja Van\nSprundel. \n\nORIGINAL ADVISORY:\nhttp://projects.info-pull.com/mokb/MOKB-09-11-2006.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0021"
      },
      {
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "db": "BID",
        "id": "22146"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23383"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      }
    ],
    "trust": 4.23
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-23383",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-23383"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "22146",
        "trust": 3.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#794752",
        "trust": 3.6
      },
      {
        "db": "SECUNIA",
        "id": "24198",
        "trust": 3.3
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0021",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1017661",
        "trust": 2.5
      },
      {
        "db": "USCERT",
        "id": "TA07-047A",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "32715",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0274",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "24479",
        "trust": 1.6
      },
      {
        "db": "SECTRACK",
        "id": "1017751",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "22808",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "23088",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "21291",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "20982",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096",
        "trust": 0.8
      },
      {
        "db": "USCERT",
        "id": "SA07-047A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384",
        "trust": 0.7
      },
      {
        "db": "CERT/CC",
        "id": "TA07-047A",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "31679",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2007-02-15",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "3166",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "53872",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-23383",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "51846",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23383"
      },
      {
        "db": "BID",
        "id": "22146"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "id": "VAR-200701-0516",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-23383"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-09-19T21:29:58.621000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security Update 2007-002 (Panther)",
        "trust": 0.8,
        "url": "http://www.apple.com/support/downloads/securityupdate2007002panther.html"
      },
      {
        "title": "Security Update 2007-002 (PPC)",
        "trust": 0.8,
        "url": "http://www.apple.com/support/downloads/securityupdate2007002ppc.html"
      },
      {
        "title": "Security Update 2007-002 (Universal)",
        "trust": 0.8,
        "url": "http://www.apple.com/support/downloads/securityupdate2007002universal.html"
      },
      {
        "title": "Security Update 2007-002",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=305102-en"
      },
      {
        "title": "Security Update 2007-002",
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=305102-ja"
      },
      {
        "title": "Security Update 2007-002 (PPC)",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002ppc.html"
      },
      {
        "title": "Security Update 2007-002 (Universal)",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002universal.html"
      },
      {
        "title": "Security Update 2007-002 (Panther)",
        "trust": 0.8,
        "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002panther.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://www.securityfocus.com/bid/22146"
      },
      {
        "trust": 2.8,
        "url": "http://projects.info-pull.com/moab/moab-20-01-2007.html"
      },
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/794752"
      },
      {
        "trust": 2.5,
        "url": "http://docs.info.apple.com/article.html?artnum=305102"
      },
      {
        "trust": 2.5,
        "url": "http://www.us-cert.gov/cas/techalerts/ta07-047a.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2007/feb/msg00000.html"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/32715"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1017661"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24198"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/24198/"
      },
      {
        "trust": 1.6,
        "url": "http://docs.info.apple.com/article.html?artnum=305214"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/24479/"
      },
      {
        "trust": 1.6,
        "url": "http://securitytracker.com/alerts/2007/mar/1017751.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/0274"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31679"
      },
      {
        "trust": 0.9,
        "url": "http://projects.info-pull.com/mokb/mokb-09-11-2006.html"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/22808/"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2007/feb/1017661.html"
      },
      {
        "trust": 0.8,
        "url": "http://projects.info-pull.com/mokb/mokb-26-11-2006.html"
      },
      {
        "trust": 0.8,
        "url": "http://projects.info-pull.com/mokb/bug-files/mokb-26-11-2006.bz2"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/23088/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/21291"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/20982"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0021"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta07-047a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trta07-047a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0021"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/cas/alerts/sa07-047a.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/0274"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/31679"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/ichat/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/products/48/?r=l"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/how_to_buy/15/?r=l"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23383"
      },
      {
        "db": "BID",
        "id": "22146"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23383"
      },
      {
        "db": "BID",
        "id": "22146"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-02-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "date": "2007-03-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "date": "2007-03-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "date": "2007-01-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-23383"
      },
      {
        "date": "2007-01-20T00:00:00",
        "db": "BID",
        "id": "22146"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "date": "2006-11-10T16:02:24",
        "db": "PACKETSTORM",
        "id": "51846"
      },
      {
        "date": "2007-01-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      },
      {
        "date": "2007-01-23T00:28:00",
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#794752"
      },
      {
        "date": "2007-03-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#346656"
      },
      {
        "date": "2007-07-21T00:00:00",
        "db": "CERT/CC",
        "id": "VU#765096"
      },
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-23383"
      },
      {
        "date": "2007-02-20T20:27:00",
        "db": "BID",
        "id": "22146"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-000072"
      },
      {
        "date": "2007-01-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      },
      {
        "date": "2017-07-29T01:29:54.547000",
        "db": "NVD",
        "id": "CVE-2007-0021"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple iChat AIM URI handler format string vulnerability",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#794752"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "format string",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-384"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.