Vulnerability Details : CVE-2007-0229
Integer overflow in the ffs_mountfs function in Mac OS X 10.4.8 and FreeBSD 6.1 allows local users to cause a denial of service (panic) and possibly gain privileges via a crafted DMG image that causes "allocation of a negative size buffer" leading to a heap-based buffer overflow, a related issue to CVE-2006-5679. NOTE: a third party states that this issue does not cross privilege boundaries in FreeBSD because only root may mount a filesystem.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2007-0229
Probability of exploitation activity in the next 30 days: 96.77%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-0229
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2007-0229
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-0229
-
http://projects.info-pull.com/moab/MOAB-10-01-2007.html
Exploit
- http://docs.info.apple.com/article.html?artnum=305214
-
http://applefun.blogspot.com/2007/01/moab-10-01-2007-apple-dmg-ufs.html
-
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
Page Not Found | CISAUS Government Resource
-
http://www.vupen.com/english/advisories/2007/0141
Vendor Advisory
-
http://www.securityfocus.com/bid/21993
- http://www.securitytracker.com/id?1017751
-
http://www.vupen.com/english/advisories/2007/0930
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
- http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/31409
- http://lists.freebsd.org/pipermail/freebsd-security/2007-January/004218.html
Products affected by CVE-2007-0229
- cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*