Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute arbitrary code via an AppleDouble attachment containing an apparently-safe file type and script in a resource fork, which does not warn the user that a separate program is going to be executed. NOTE: this is a regression error related to CVE-2006-0395.
References
Link | Resource |
---|---|
http://www.heise-security.co.uk/news/99257 | Vendor Advisory |
http://www.kb.cert.org/vuls/id/433819 | US Government Resource |
http://www.securityfocus.com/bid/26510 | Exploit |
http://secunia.com/advisories/27785 | Vendor Advisory |
http://docs.info.apple.com/article.html?artnum=307179 | |
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html | |
http://www.us-cert.gov/cas/techalerts/TA07-352A.html | US Government Resource |
http://securitytracker.com/id?1019106 | |
http://secunia.com/advisories/28136 | Vendor Advisory |
http://www.vupen.com/english/advisories/2007/4238 | Vendor Advisory |
http://www.vupen.com/english/advisories/2007/3958 | Vendor Advisory |
Configurations
Information
Published : 2007-11-28 17:46
Updated : 2011-10-05 21:00
NVD link : CVE-2007-6165
Mitre link : CVE-2007-6165
JSON object : View
Products Affected
apple
- mac_os_x