Directory traversal vulnerability in iChat in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, when AIM is used, allows remote attackers to create arbitrary files via directory traversal sequences in an inline image-transfer operation.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html | Vendor Advisory |
http://www.securityfocus.com/bid/40871 | Patch |
http://securitytracker.com/id?1024103 | |
http://support.apple.com/kb/HT4188 | Patch Vendor Advisory |
http://secunia.com/advisories/40220 | Vendor Advisory |
http://www.vupen.com/english/advisories/2010/1481 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2010-06-17 09:30
Updated : 2010-06-17 09:30
NVD link : CVE-2010-1374
Mitre link : CVE-2010-1374
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
apple
- mac_os_x
- mac_os_x_server
aol
- aim