Vulnerability Note VU#515792

Apple Mac OS X DMG UFS byte_swap_sbin() function Integer Overflow

Original Release date: 15 Mar 2007 | Last revised: 15 Mar 2007


The Apple Mac OS X byte_swap_sbin() function contains an integer overflow vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.


DMG files are disk images that can contain a variety of filesystems. Apple Mac OS X contains an integer overflow vulnerability in the byte_swap_bin() function in the UFS filesystem handling code.


By convincing a user to mount a specially-crafted DMG file, such as by viewing a web page with Safari, a remote, unauthenticated attacker may be able to execute code with the privileges of the user or cause a denial-of-service condition. Note that it is reported that it is unlikely that code execution can take place as a result of this vulnerability.


Apply an update

Apple has published Mac OS X 10.4.9 for Mac OS X 10.4 (Tiger) systems and Security Update 2007-003 for Mac OS X 10.3 (Panther) systems in response to this issue. See Apple Security Update 2007-003 for more details.

Do not open untrusted Apple disk images

Do not open unfamiliar or unexpected Apple disk images, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010.

Disable "Open 'safe' files after downloading" in Safari

Disable the option "Open 'safe' files after downloading" in Safari, as specified in the Securing Your Web Browser document. This will help prevent automatic exploitation of this and other vulnerabilities.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-15 Mar 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was publicly reported by LMH.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-0299
  • Date Public: 11 Jan 2007
  • Date First Published: 15 Mar 2007
  • Date Last Updated: 15 Mar 2007
  • Severity Metric: 7.01
  • Document Revision: 9


If you have feedback, comments, or additional information about this vulnerability, please send us email.