search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple Mac OS X AFP server vulnerable to DoS via maliciously crafted AFP request

Vulnerability Note VU#180692

Original Release Date: 2006-08-04 | Last Revised: 2006-09-18


A vulnerability in the Apple Mac OS X AFP server may allow an attacker to cause a denial-of-service condition on an affected system.


The AFP (Apple Filing Protocol) service allows Apple Mac OS clients to access files remotely from a server. Apple's Mac OS X AFP server contains an unchecked error condition. When file sharing is enabled, a remote attacker can exploit this vulnerability by sending a specially crafted invalid AFP request. This crafted AFP request may cause the service to crash, resulting in a denial-of-service condition. Apple states that any Mac OS X system with AFP server enabled is vulnerable; however, AFP server is not enabled by default on Apple Mac OS X.


When file sharing is enabled, a maliciously crafted AFP request may cause the AFP server to crash, resulting in a denial-of-service condition.


Apply an update

Apple has addressed this issue in Security Update 2006-004.


Disable file sharing if it is not required. File sharing can be disabled in the "Sharing" settings of system preferences.

Vendor Information


Apple Computer, Inc. Affected

Notified:  August 02, 2006 Updated: August 04, 2006



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Please see Apple Security Update 2006-004 for details on updates.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Apple Product Security for reporting this vulnerability.

This document was written by Katie Washok.

Other Information

CVE IDs: CVE-2006-3496
Severity Metric: 0.81
Date Public: 2006-08-01
Date First Published: 2006-08-04
Date Last Updated: 2006-09-18 18:01 UTC
Document Revision: 23

Sponsored by CISA.