var-200702-0109
Vulnerability from variot
The Bonjour functionality in iChat in Apple Mac OS X 10.3.9 allows remote attackers to cause a denial of service (persistent application crash) via unspecified vectors, possibly related to CVE-2007-0614. Apple iChat is prone to multiple remote denial-of-service vulnerabilities. These issues affect the Bonjour functionality. Apple iChat 3.1.6 is reported affected; other versions may be vulnerable as well. Apple iChat is a video chat tool bundled with Apple's family of operating systems. Several denial-of-service vulnerabilities exist in iChat's Bonjour feature, which allows automatic discovery of computers. There are no restrictions on finding available contacts via mDNS queries, iChat will add the broadcasted _presence._tcp record even if the contact does not exist, so a malicious user can broadcast a fake record so that iChat users using Bonjour cannot discover more peers, unable to communicate reliably. Trying to start iChat Bonjour again will fail because mDNSResponder keeps a specially crafted record.
To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German.
The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios.
The vulnerability exists due to an error in the "fpathconf()" syscall when it is called with an unsupported file type and can be exploited to cause a system panic.
The vulnerability is confirmed in version 10.4.8.
SOLUTION: Grant only trusted users access to affected systems.
PROVIDED AND/OR DISCOVERED BY: Initially discovered in FreeBSD and reported in Mac OS X by Ilja Van Sprundel.
ORIGINAL ADVISORY: http://projects.info-pull.com/mokb/MOKB-09-11-2006.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200702-0109", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 2.4, "vendor": "apple computer", "version": null }, { "model": "ichat", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.x" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.x" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.x" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.x" }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.3.9" }, { "model": "ichat", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.6" } ], "sources": [ { "db": "CERT/CC", "id": "VU#346656" }, { "db": "CERT/CC", "id": "VU#765096" }, { "db": "CERT/CC", "id": "VU#836024" }, { "db": "BID", "id": "22304" }, { "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "db": "CNNVD", "id": "CNNVD-200702-343" }, { "db": "NVD", "id": "CVE-2007-0710" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000121" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "LMH lmh@info-pull.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200702-343" } ], "trust": 0.6 }, "cve": "CVE-2007-0710", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2007-0710", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2007-0710", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-24072", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-0710", "trust": 1.0, "value": "LOW" }, { "author": "CARNEGIE MELLON", "id": "VU#346656", "trust": 0.8, "value": "17.10" }, { "author": "CARNEGIE MELLON", "id": "VU#765096", "trust": 0.8, "value": "5.18" }, { "author": "CARNEGIE MELLON", "id": "VU#836024", "trust": 0.8, "value": "2.48" }, { "author": "NVD", "id": "CVE-2007-0710", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200702-343", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-24072", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#346656" }, { "db": "CERT/CC", "id": "VU#765096" }, { "db": "CERT/CC", "id": "VU#836024" }, { "db": "VULHUB", "id": "VHN-24072" }, { "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "db": "CNNVD", "id": "CNNVD-200702-343" }, { "db": "NVD", "id": "CVE-2007-0710" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bonjour functionality in iChat in Apple Mac OS X 10.3.9 allows remote attackers to cause a denial of service (persistent application crash) via unspecified vectors, possibly related to CVE-2007-0614. Apple iChat is prone to multiple remote denial-of-service vulnerabilities. These issues affect the Bonjour functionality. \nApple iChat 3.1.6 is reported affected; other versions may be vulnerable as well. Apple iChat is a video chat tool bundled with Apple\u0027s family of operating systems. Several denial-of-service vulnerabilities exist in iChat\u0027s Bonjour feature, which allows automatic discovery of computers. There are no restrictions on finding available contacts via mDNS queries, iChat will add the broadcasted _presence._tcp record even if the contact does not exist, so a malicious user can broadcast a fake record so that iChat users using Bonjour cannot discover more peers, unable to communicate reliably. Trying to start iChat Bonjour again will fail because mDNSResponder keeps a specially crafted record. \n\n----------------------------------------------------------------------\n\nTo improve our services to our customers, we have made a number of\nadditions to the Secunia Advisories and have started translating the\nadvisories to German. \n\nThe improvements will help our customers to get a better\nunderstanding of how we reached our conclusions, how it was rated,\nour thoughts on exploitation, attack vectors, and scenarios. \n\nThe vulnerability exists due to an error in the \"fpathconf()\" syscall\nwhen it is called with an unsupported file type and can be exploited\nto cause a system panic. \n\nThe vulnerability is confirmed in version 10.4.8. \n\nSOLUTION:\nGrant only trusted users access to affected systems. \n\nPROVIDED AND/OR DISCOVERED BY:\nInitially discovered in FreeBSD and reported in Mac OS X by Ilja Van\nSprundel. \n\nORIGINAL ADVISORY:\nhttp://projects.info-pull.com/mokb/MOKB-09-11-2006.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-0710" }, { "db": "CERT/CC", "id": "VU#346656" }, { "db": "CERT/CC", "id": "VU#765096" }, { "db": "CERT/CC", "id": "VU#836024" }, { "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "db": "BID", "id": "22304" }, { "db": "VULHUB", "id": "VHN-24072" }, { "db": "PACKETSTORM", "id": "51846" } ], "trust": 4.23 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-24072", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-24072" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECTRACK", "id": "1017661", "trust": 3.3 }, { "db": "SECUNIA", "id": "24198", "trust": 3.3 }, { "db": "CERT/CC", "id": "VU#836024", "trust": 3.3 }, { "db": "BID", "id": "22304", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2007-0710", "trust": 2.8 }, { "db": "OSVDB", "id": "32713", "trust": 1.7 }, { "db": "SECUNIA", "id": "24479", "trust": 1.6 }, { "db": "SECTRACK", "id": "1017751", "trust": 1.6 }, { "db": "SECUNIA", "id": "22808", "trust": 0.9 }, { "db": "SECUNIA", "id": "23088", "trust": 0.8 }, { "db": "BID", "id": "21291", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#346656", "trust": 0.8 }, { "db": "BID", "id": "20982", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#765096", "trust": 0.8 }, { "db": "SECUNIA", "id": "23945", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2007-000121", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200702-343", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2007-02-15", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "3230", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-24072", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "51846", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#346656" }, { "db": "CERT/CC", "id": "VU#765096" }, { "db": "CERT/CC", "id": "VU#836024" }, { "db": "VULHUB", "id": "VHN-24072" }, { "db": "BID", "id": "22304" }, { "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "db": "PACKETSTORM", "id": "51846" }, { "db": "CNNVD", "id": "CNNVD-200702-343" }, { "db": "NVD", "id": "CVE-2007-0710" } ] }, "id": "VAR-200702-0109", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-24072" } ], "trust": 0.01 }, "last_update_date": "2024-09-19T21:35:07.094000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Update 2007-002 (Panther)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2007002panther.html" }, { "title": "Security Update 2007-002 (PPC)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2007002ppc.html" }, { "title": "Security Update 2007-002 (Universal)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2007002universal.html" }, { "title": "Security Update 2007-002", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305102-en" }, { "title": "Security Update 2007-002", "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=305102-ja" }, { "title": "Security Update 2007-002 (PPC)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002ppc.html" }, { "title": "Security Update 2007-002 (Universal)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002universal.html" }, { "title": "Security Update 2007-002 (Panther)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2007002panther.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000121" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-24072" }, { "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "db": "NVD", "id": "CVE-2007-0710" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://docs.info.apple.com/article.html?artnum=305102" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/22304" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/836024" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1017661" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2007/feb/msg00000.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/32713" }, { "trust": 1.7, "url": "http://secunia.com/advisories/24198" }, { "trust": 1.6, "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24479/" }, { "trust": 1.6, "url": "http://securitytracker.com/alerts/2007/mar/1017751.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24198/" }, { "trust": 1.1, "url": "http://projects.info-pull.com/moab/moab-29-01-2007.html" }, { "trust": 0.9, "url": "http://projects.info-pull.com/mokb/mokb-09-11-2006.html" }, { "trust": 0.9, "url": "http://secunia.com/advisories/22808/" }, { "trust": 0.8, "url": "http://projects.info-pull.com/mokb/mokb-26-11-2006.html" }, { "trust": 0.8, "url": "http://projects.info-pull.com/mokb/bug-files/mokb-26-11-2006.bz2" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23088/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/21291" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/20982" }, { "trust": 0.8, "url": "http://secunia.com/advisories/23945/" }, { "trust": 0.8, "url": "http://www.apple.com/macosx/features/ichat/" }, { "trust": 0.8, "url": "http://developer.apple.com/networking/bonjour/index.html" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2007/feb/1017661.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0710" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0710" }, { "trust": 0.3, "url": "http://www.apple.com/ichat/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/products/48/?r=l" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/96/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/15/?r=l" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#346656" }, { "db": "CERT/CC", "id": "VU#765096" }, { "db": "CERT/CC", "id": "VU#836024" }, { "db": "VULHUB", "id": "VHN-24072" }, { "db": "BID", "id": "22304" }, { "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "db": "PACKETSTORM", "id": "51846" }, { "db": "CNNVD", "id": "CNNVD-200702-343" }, { "db": "NVD", "id": "CVE-2007-0710" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#346656" }, { "db": "CERT/CC", "id": "VU#765096" }, { "db": "CERT/CC", "id": "VU#836024" }, { "db": "VULHUB", "id": "VHN-24072" }, { "db": "BID", "id": "22304" }, { "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "db": "PACKETSTORM", "id": "51846" }, { "db": "CNNVD", "id": "CNNVD-200702-343" }, { "db": "NVD", "id": "CVE-2007-0710" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-14T00:00:00", "db": "CERT/CC", "id": "VU#346656" }, { "date": "2007-03-14T00:00:00", "db": "CERT/CC", "id": "VU#765096" }, { "date": "2007-02-26T00:00:00", "db": "CERT/CC", "id": "VU#836024" }, { "date": "2007-02-16T00:00:00", "db": "VULHUB", "id": "VHN-24072" }, { "date": "2007-01-29T00:00:00", "db": "BID", "id": "22304" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "date": "2006-11-10T16:02:24", "db": "PACKETSTORM", "id": "51846" }, { "date": "2007-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200702-343" }, { "date": "2007-02-16T19:28:00", "db": "NVD", "id": "CVE-2007-0710" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-30T00:00:00", "db": "CERT/CC", "id": "VU#346656" }, { "date": "2007-07-21T00:00:00", "db": "CERT/CC", "id": "VU#765096" }, { "date": "2007-03-16T00:00:00", "db": "CERT/CC", "id": "VU#836024" }, { "date": "2008-09-05T00:00:00", "db": "VULHUB", "id": "VHN-24072" }, { "date": "2016-07-06T14:40:00", "db": "BID", "id": "22304" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000121" }, { "date": "2007-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200702-343" }, { "date": "2008-09-05T21:18:36.677000", "db": "NVD", "id": "CVE-2007-0710" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "51846" }, { "db": "CNNVD", "id": "CNNVD-200702-343" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X fails to properly handle corrupted Universal Mach-O Binaries", "sources": [ { "db": "CERT/CC", "id": "VU#346656" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200702-343" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.