Vulnerability Note VU#367424

Apple Mac OS X fails to properly handle corrupted DMG image structures

Original Release date: 22 Nov 2006 | Last revised: 20 Mar 2007

Overview

Apple Mac OS X fails to properly handle corrupted DMG image structures. The complete impact of this vulnerability is unclear, but may include execution of arbitrary code or denial of service.

Description

A vulnerability in the way Mac OS X com.apple.AppleDiskImageController handles malformed DMG files could lead to a memory corruption.

We are aware of publicly available proof-of-concept code that demonstrates this vulnerability.

Impact

The complete impact of this vulnerability is unclear, but may include execution of arbitrary code or denial of service.

Solution

Upgrade

Apple has issued an upgrade to address this issue. See Apple Security Update 2007-003 for more details.

Disable Open “safe” files after downloading option

For instructions on how to disable the Open “safe” files after downloading option in Safari, please refer to the Safari section of the Securing Your Web Browser document.

Do not access DMG files from untrusted sources

Do not download DMG files from unknown or untrusted sources. Do not open unfamiliar or unexpected links, particularly those delivered in email messages. Please see Cyber Security Tip ST04-014.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected21 Nov 200613 Mar 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This issue was reported in Month of Kernel Bugs MOKB-20-11-2006 by LMH.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2006-6061
  • Date Public: 20 Nov 2006
  • Date First Published: 22 Nov 2006
  • Date Last Updated: 20 Mar 2007
  • Severity Metric: 15.99
  • Document Revision: 32

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.