VAR-200602-0446

Vulnerability from variot - Updated: 2025-12-22 21:38

The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension. Apple Safari WebKit component is vulnerable to buffer overflow. Mac OS X of Web browser Safari Contains an arbitrary code execution vulnerability in its default configuration. Safari Now, in the default settings, Resource forks Refer to the file type defined in .If the file type is image / video / compressed file, "Safe" file Will be processed automatically. This allows for crafted files "Safe" file There is a possibility that arbitrary code execution may be executed as a result. Exploit code that exploits this vulnerability has already been published.A remote third party could execute arbitrary code with the privileges of the logged-in user. If a user is logged in with an account with administrator privileges, the resulting vulnerable system could be completely controlled. Commands would be executed in the context of the user opening the archive file. Attackers can reportedly use Safari and Apple Mail as exploitation vectors for this vulnerability. Mac OS X 10.4.5 is reported to be vulnerable. Earlier versions may also be affected. Apple Safari is a web browser bundled with the Apple operating system. There is an issue in Safari's handling of automatic opening of downloaded files.

TITLE: Mac OS X Security Update Fixes Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA19064

VERIFY ADVISORY: http://secunia.com/advisories/19064/

CRITICAL: Extremely critical

IMPACT: Security Bypass, Cross Site Scripting, Privilege escalation, DoS, System access

WHERE:

From remote

OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/

DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

1) Various security issues exist in the PHP Apache module and scripting environment.

For more information: SA17371

2) An error in automount makes it possible for malicious file servers to cause a vulnerable system to mount file systems with reserved names, which can cause a DoS (Denial of Service) or potentially allow arbitrary code execution.

3) An input validation error in the BOM framework when unpacking certain archives can be exploited to cause files to be unpacked to arbitrary locations via directory traversal attacks.

4) The "passwd" program creates temporary files insecurely, which can be exploited via symlink attacks to create or overwrite arbitrary files with "root" privileges.

5) User directories are insecurely mounted when a FileVault image is created, which may allow unauthorised access to files.

6) An error in IPSec when handling certain error conditions can be exploited to cause a DoS against VPN connections.

7) An error in the LibSystem component can be exploited by malicious people to cause a heap-based buffer overflow via applications when requesting large amounts of memory.

8) The "Download Validation" in the Mail component fails to warn users about unsafe file types when an e-mail attachment is double-clicked.

9) In certain cases a Perl program may fail to drop privileges.

For more information: SA17922

10) A boundary error in rsync can be exploited by authenticated users to cause a heap-based buffer overflow when it's allowed to transfer extended attributes.

11) A boundary error in WebKit's handling of certain HTML can be exploited to cause a heap-based buffer overflow.

12) A boundary error in Safari when parsing JavaScript can be exploited to cause a stack-based buffer overflow and allows execution of arbitrary code when a malicious web page including specially crafted JavaScript is viewed.

13) An error in Safari's security model when handling HTTP redirection can be exploited to execute JavaScript in the local domain via a specially crafted web site.

This vulnerability is related to: SA18963

15) An input validation error in the Syndication (Safari RSS) component can be exploited to conduct cross-site scripting attacks when subscribing to malicious RSS content.

SOLUTION: Apply Security Update 2006-001. 4) Vade 79 (the vendor also credits Ilja van Sprundel and iDEFENSE). 6) The vendor credits OUSPG from the University of Oulu, NISCC, and CERT-FI. 7) The vendor credits Neil Archibald, Suresec LTD. 10) The vendor credits Jan-Derk Bakker. 11) The vendor credits Suresec LTD.

ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=303382

Vade79: http://fakehalo.us/xosx-passwd.pl

OTHER REFERENCES: SA18963: http://secunia.com/advisories/18963/

SA17922: http://secunia.com/advisories/17922/

SA17371: http://secunia.com/advisories/17371/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200602-0446",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.4.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.3.9"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.5"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.3.9"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michael Lehn",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-0848",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CVE-2006-0848",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-16956",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-0848",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#351217",
            "trust": 0.8,
            "value": "17.21"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#999708",
            "trust": 0.8,
            "value": "35.44"
          },
          {
            "author": "NVD",
            "id": "CVE-2006-0848",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200602-347",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-16956",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The \"Open \u0027safe\u0027 files after downloading\" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension. Apple Safari WebKit component is vulnerable to buffer overflow. Mac OS X of Web browser Safari Contains an arbitrary code execution vulnerability in its default configuration. Safari Now, in the default settings, Resource forks Refer to the file type defined in .If the file type is image / video / compressed file, \"Safe\" file Will be processed automatically. This allows for crafted files \"Safe\" file There is a possibility that arbitrary code execution may be executed as a result. Exploit code that exploits this vulnerability has already been published.A remote third party could execute arbitrary code with the privileges of the logged-in user. If a user is logged in with an account with administrator privileges, the resulting vulnerable system could be completely controlled. Commands would be executed in the context of the user opening the archive file. \nAttackers can reportedly use Safari and Apple Mail as exploitation vectors for this vulnerability. \nMac OS X 10.4.5 is reported to be vulnerable. Earlier versions may also be affected. Apple Safari is a web browser bundled with the Apple operating system. There is an issue in Safari\u0027s handling of automatic opening of downloaded files. \n\nTITLE:\nMac OS X Security Update Fixes Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA19064\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/19064/\n\nCRITICAL:\nExtremely critical\n\nIMPACT:\nSecurity Bypass, Cross Site Scripting, Privilege escalation, DoS,\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nApple has issued a security update for Mac OS X, which fixes multiple\nvulnerabilities. \n\n1) Various security issues exist in the PHP Apache module and\nscripting environment. \n\nFor more information:\nSA17371\n\n2) An error in automount makes it possible for malicious file servers\nto cause a vulnerable system to mount file systems with reserved\nnames, which can cause a DoS (Denial of Service) or potentially allow\narbitrary code execution. \n\n3) An input validation error in the BOM framework when unpacking\ncertain archives can be exploited to cause files to be unpacked to\narbitrary locations via directory traversal attacks. \n\n4) The \"passwd\" program creates temporary files insecurely, which can\nbe exploited via symlink attacks to create or overwrite arbitrary\nfiles with \"root\" privileges. \n\n5) User directories are insecurely mounted when a FileVault image is\ncreated, which may allow unauthorised access to files. \n\n6) An error in IPSec when handling certain error conditions can be\nexploited to cause a DoS against VPN connections. \n\n7) An error in the LibSystem component can be exploited by malicious\npeople to cause a heap-based buffer overflow via applications when\nrequesting large amounts of memory. \n\n8) The \"Download Validation\" in the Mail component fails to warn\nusers about unsafe file types when an e-mail attachment is\ndouble-clicked. \n\n9) In certain cases a Perl program may fail to drop privileges. \n\nFor more information:\nSA17922\n\n10) A boundary error in rsync can be exploited by authenticated users\nto cause a heap-based buffer overflow when it\u0027s allowed to transfer\nextended attributes. \n\n11) A boundary error in WebKit\u0027s handling of certain HTML can be\nexploited to cause a heap-based buffer overflow. \n\n12) A boundary error in Safari when parsing JavaScript can be\nexploited to cause a stack-based buffer overflow and allows execution\nof arbitrary code when a malicious web page including specially\ncrafted JavaScript is viewed. \n\n13) An error in Safari\u0027s security model when handling HTTP\nredirection can be exploited to execute JavaScript in the local\ndomain via a specially crafted web site. \n\nThis vulnerability is related to:\nSA18963\n\n15) An input validation error in the Syndication (Safari RSS)\ncomponent can be exploited to conduct cross-site scripting attacks\nwhen subscribing to malicious RSS content. \n\nSOLUTION:\nApply Security Update 2006-001. \n4) Vade 79 (the vendor also credits Ilja van Sprundel and iDEFENSE). \n6) The vendor credits OUSPG from the University of Oulu, NISCC, and\nCERT-FI. \n7) The vendor credits Neil Archibald, Suresec LTD. \n10) The vendor credits Jan-Derk Bakker. \n11) The vendor credits Suresec LTD. \n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=303382\n\nVade79:\nhttp://fakehalo.us/xosx-passwd.pl\n\nOTHER REFERENCES:\nSA18963:\nhttp://secunia.com/advisories/18963/\n\nSA17922:\nhttp://secunia.com/advisories/17922/\n\nSA17371:\nhttp://secunia.com/advisories/17371/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0848"
      },
      {
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "db": "PACKETSTORM",
        "id": "44297"
      }
    ],
    "trust": 3.51
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-16956",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-0848",
        "trust": 3.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "16736",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1015652",
        "trust": 2.5
      },
      {
        "db": "SECUNIA",
        "id": "18963",
        "trust": 2.5
      },
      {
        "db": "USCERT",
        "id": "TA06-053A",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "23510",
        "trust": 1.7
      },
      {
        "db": "USCERT",
        "id": "TA06-062A",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-0671",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "24808",
        "trust": 1.4
      },
      {
        "db": "SECUNIA",
        "id": "19064",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "18220",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#351217",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347",
        "trust": 0.7
      },
      {
        "db": "CERT/CC",
        "id": "TA06-053A",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "TA06-062A",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "82306",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16866",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-88754",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-71364",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-16956",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "44297",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "PACKETSTORM",
        "id": "44297"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "id": "VAR-200602-0446",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-12-22T21:38:07.402000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "TA23971",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/TA23971"
      },
      {
        "title": "TA23971",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/TA23971?viewlocale=ja_JP"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-16",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://docs.info.apple.com/article.html?artnum=303382"
      },
      {
        "trust": 2.5,
        "url": "http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html"
      },
      {
        "trust": 2.5,
        "url": "http://www.heise.de/english/newsticker/news/69862"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/16736"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/999708"
      },
      {
        "trust": 1.7,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-053a.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-062a.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.frsirt.com/exploits/20060222.safari_safefiles_exec.pm.php"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/23510"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015652"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/18963"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/24808"
      },
      {
        "trust": 1.1,
        "url": "http://docs.info.apple.com/article.html?artnum=303453"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/0671"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24808"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/19064/"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/18963/"
      },
      {
        "trust": 0.8,
        "url": "http://security-protocols.com/advisory/sp-x22-advisory.txt"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/18220/"
      },
      {
        "trust": 0.8,
        "url": "http://webkit.opendarwin.org/"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/documentation/carbon/conceptual/launchservicesconcepts/lscconcepts/chapter_2_section_8.html"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/technotes/tn/tn2017.html"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/documentation/mac/moretoolbox/moretoolbox-11.html"
      },
      {
        "trust": 0.8,
        "url": "http://docs.info.apple.com/article.html?artnum=108009"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0397"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0398"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0399"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2006/feb/1015652.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-0848"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnta06-053a/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-0848"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/0671"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/17922/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2006001macosx1045clientintel.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate20060011039server.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2006001macosx1045ppc.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/17371/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate20060011039client.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://fakehalo.us/xosx-passwd.pl"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "PACKETSTORM",
        "id": "44297"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "db": "BID",
        "id": "16736"
      },
      {
        "db": "PACKETSTORM",
        "id": "44297"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-03-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "date": "2006-02-21T00:00:00",
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "date": "2006-02-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "date": "2006-02-21T00:00:00",
        "db": "BID",
        "id": "16736"
      },
      {
        "date": "2006-03-02T21:01:19",
        "db": "PACKETSTORM",
        "id": "44297"
      },
      {
        "date": "2006-02-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      },
      {
        "date": "2009-04-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "date": "2006-02-22T23:02:00",
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-03-06T00:00:00",
        "db": "CERT/CC",
        "id": "VU#351217"
      },
      {
        "date": "2006-12-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#999708"
      },
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16956"
      },
      {
        "date": "2016-07-06T14:40:00",
        "db": "BID",
        "id": "16736"
      },
      {
        "date": "2006-08-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      },
      {
        "date": "2009-04-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000877"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2006-0848"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Safari WebKit component vulnerable to buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#351217"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "configuration error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200602-347"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…