{"id":137,"date":"2006-09-01T12:08:40","date_gmt":"2006-09-01T16:08:40","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2006\/09\/01\/hi-im-a-mac\/"},"modified":"2006-09-04T01:05:22","modified_gmt":"2006-09-04T05:05:22","slug":"hi-im-a-mac","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2006\/09\/01\/hi-im-a-mac\/","title":{"rendered":"Hi, I&#8217;m a Mac"},"content":{"rendered":"<p>And I can get 0wned just like you PC.  <\/p>\n<p>* ImageIO<\/p>\n<p><em>CVE-ID: CVE-2006-3459, CVE-2006-3461, CVE-2006-3462, CVE-2006-3465<\/em><\/p>\n<p>Available for: Mac OS X v10.4.7 Build 8K1079, Mac OS X Server v10.4.7 Build 8K1079<\/p>\n<p><strong>Impact: Viewing a maliciously-crafted TIFF image may lead to an application crash or arbitrary code execution<\/strong><\/p>\n<p>Description: Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue.<\/p>\n<p>Note:A fifth issue discovered by Tavis Ormandy, CVE-2006-3460, does not affect Mac OS X.<\/p>\n<p> * OpenSSH<\/p>\n<p>CVE-ID: CVE-2006-0393<\/p>\n<p>Available for: Mac OS X v10.4.7 Build 8K1079, Mac OS X Server v10.4.7 Build 8K1079<br \/>\n<strong><br \/>\nImpact: When remote login is enabled, remote attackers may cause a denial of service or determine whether an account exists<\/strong><\/p>\n<p>Description: Attempting to log in to an OpenSSH server (&#8220;Remote Login&#8221;) using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>And I can get 0wned just like you PC. * ImageIO CVE-ID: CVE-2006-3459, CVE-2006-3461, CVE-2006-3462, CVE-2006-3465 Available for: Mac OS X v10.4.7 Build 8K1079, Mac OS X Server v10.4.7 Build 8K1079 Impact: Viewing a maliciously-crafted TIFF image may lead to an application crash or arbitrary code execution Description: Buffer overflows were discovered in TIFF tag [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[275,431],"tags":[],"class_list":["post-137","post","type-post","status-publish","format-standard","hentry","category-vulnerabilities","category-zeroday"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=137"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/137\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}