Apple Mac OS X AirPort无线驱动多个缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111094 漏洞类型 缓冲区溢出
发布时间 2006-09-21 更新时间 2006-09-22
CVE编号 CVE-2006-3507 CNNVD-ID CNNVD-200609-376
漏洞平台 OSX CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/28643
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200609-376
|漏洞详情
AppleMacOSX是苹果家族机器所使用的操作系统。AppleMacOSX的AirPort无线驱动中存在多个溢出漏洞,具体如下:AirPort无线驱动在处理畸形帧时存在两个栈溢出。攻击者可以向无线网络中注入恶意的帧来触发这个溢出,如果打开了AirPort的话就会导致以系统权限执行任意指令。AirPort无线驱动在处理扫描缓存更新时存在堆溢出。攻击者可以向无线网络中注入恶意的帧来触发这个溢出,导致系统崩溃、权限提升或以系统权限执行任意指令。Airport无线驱动的第三方无线软件API中存在整数溢出,导致依赖于API使用的应用程序出现溢出。如果应用程序受影响的话,则攻击者可以向无线网络中注入恶意的帧来触发这个溢出,导致崩溃或以运行应用程序用户的权限执行任意指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/20144/info

The Apple Mac OS X AirPort wireless driver is prone to multiple buffer-overflow vulnerabilities because it fails to perform sufficient bounds checking before copying data to finite-sized buffers.

An attacker can exploit these issues to have arbitrary machine code execute with kernel-level privileges. One of the issues allows code execution in the context of an application using the wireless API. This may lead to denial-of-service conditions or the complete compromise of the affected computer.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28643.zip
|参考资料

来源:US-CERT
名称:VU#867796
链接:http://www.kb.cert.org/vuls/id/867796
来源:APPLE
名称:APPLE-SA-2006-09-21
链接:http://lists.apple.com/archives/Security-announce/2006/Sep/msg00001.html
来源:BID
名称:20144
链接:http://www.securityfocus.com/bid/20144
来源:VUPEN
名称:ADV-2006-3737
链接:http://www.frsirt.com/english/advisories/2006/3737
来源:SECTRACK
名称:1016903
链接:http://securitytracker.com/id?1016903
来源:SECUNIA
名称:22068
链接:http://secunia.com/advisories/22068