SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Apple macOS/OS X Vendors:   Apple
Mac OS X Format String Flaw in PackageKit Allows Remote Man-in-the-Middle Attacks to Execute Arbitrary Code
SecurityTracker Alert ID:  1024938
SecurityTracker URL:  http://securitytracker.com/id/1024938
CVE Reference:   CVE-2010-4013   (Links to External Site)
Date:  Jan 6 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.6 - 10.6.5
Description:   A vulnerability was reported in Mac OS X PackageKit. A remote user can execute arbitrary code on the target system.

A remote user with the ability to conduct a man-in-the-middle attack can trigger a format string flaw in PackageKit's handling of distribution scripts to execute arbitrary code when Software Update checks for new updates.

Systems prior to Mac OS X v10.6 are not affected.

Aaron Sigel of vtty.com reported this vulnerability.

Impact:   A remote user with the ability to conduct a man-in-the-middle attack can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix as part of Mac OS X Server v10.6.6, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

For Mac OS X v10.6.5
The download file is named: MacOSXUpd10.6.6.dmg
Its SHA-1 digest is: 299d22132bebdab229be531e169d65a88f4736c9

For Mac OS X v10.6 - v10.6.4
The download file is named: MacOSXUpdCombo10.6.6.dmg
Its SHA-1 digest is: 868768cbc88db1895161f74030e98e8ce2303151

For Mac OS X Server v10.6.5
The download file is named: MacOSXServerUpd10.6.6.dmg
Its SHA-1 digest is: 2f202fcbe27fa54ddd2fb8aaa5b4aa9b055301e2

For Mac OS X Server v10.6 - v10.6.4
The download file is named: MacOSXServUpdCombo10.6.6.dmg
Its SHA-1 digest is: 3d051d91a8ffe4d25b95378eb7385e94a64fc71c

The vendor's advisory is available at:

http://support.apple.com/kb/HT4498

Vendor URL:  support.apple.com/kb/HT4498 (Links to External Site)
Cause:   Input validation error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2016, SecurityGlobal.net LLC