Apple Mac OS X PS Normalizer PostScript File Stack Buffer Overflow Vulnerability
BID:39151
Info
Apple Mac OS X PS Normalizer PostScript File Stack Buffer Overflow Vulnerability
| Bugtraq ID: | 39151 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2010-0513 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 01 2010 12:00AM |
| Updated: | Apr 01 2010 12:00AM |
| Credit: | Apple |
| Vulnerable: |
Apple Mac OS X Server 10.6.2 Apple Mac OS X Server 10.6.1 Apple Mac OS X Server 10.5.8 Apple Mac OS X Server 10.5.7 Apple Mac OS X Server 10.5.6 Apple Mac OS X Server 10.5.5 Apple Mac OS X Server 10.5.4 Apple Mac OS X Server 10.5.3 Apple Mac OS X Server 10.5.2 Apple Mac OS X Server 10.5.1 Apple Mac OS X Server 10.6 Apple Mac OS X Server 10.5 Apple Mac OS X 10.6.2 Apple Mac OS X 10.6.1 Apple Mac OS X 10.5.8 Apple Mac OS X 10.5.7 Apple Mac OS X 10.5.6 Apple Mac OS X 10.5.5 Apple Mac OS X 10.5.4 Apple Mac OS X 10.5.3 Apple Mac OS X 10.5.2 Apple Mac OS X 10.5.1 Apple Mac OS X 10.6 Apple Mac OS X 10.5 |
| Not Vulnerable: |
Apple Mac OS X Server 10.6.3 Apple Mac OS X 10.6.3 |
Discussion
Apple Mac OS X PS Normalizer PostScript File Stack Buffer Overflow Vulnerability
Apple Mac OS X is prone to a stack-based buffer-overflow vulnerability that affects the PS Normalizer component.
An attacker can exploit this issue by enticing a user into opening a specially crafted PostScript file.
A successful exploit will allow attackers to execute arbitrary code with the privilegs of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it.
Apple Mac OS X is prone to a stack-based buffer-overflow vulnerability that affects the PS Normalizer component.
An attacker can exploit this issue by enticing a user into opening a specially crafted PostScript file.
A successful exploit will allow attackers to execute arbitrary code with the privilegs of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it.
Exploit / POC
Apple Mac OS X PS Normalizer PostScript File Stack Buffer Overflow Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Apple Mac OS X PS Normalizer PostScript File Stack Buffer Overflow Vulnerability
Solution:
The vendor has released an advisory and fixes. Please see the references for details.
Apple Mac OS X Server 10.6
Apple Mac OS X 10.6
Apple Mac OS X 10.5
Apple Mac OS X Server 10.5
Apple Mac OS X Server 10.5.1
Apple Mac OS X 10.5.1
Apple Mac OS X Server 10.5.2
Apple Mac OS X 10.5.2
Apple Mac OS X 10.5.3
Apple Mac OS X Server 10.5.3
Apple Mac OS X 10.5.4
Apple Mac OS X Server 10.5.4
Apple Mac OS X Server 10.5.5
Apple Mac OS X 10.5.5
Apple Mac OS X 10.5.6
Apple Mac OS X Server 10.5.6
Apple Mac OS X Server 10.5.7
Apple Mac OS X 10.5.7
Apple Mac OS X Server 10.5.8
Apple Mac OS X 10.5.8
Apple Mac OS X Server 10.6.1
Apple Mac OS X 10.6.1
Apple Mac OS X 10.6.2
Apple Mac OS X Server 10.6.2
Solution:
The vendor has released an advisory and fixes. Please see the references for details.
Apple Mac OS X Server 10.6
-
Apple MacOSXServerUpdCombo10.6.3.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.6
-
Apple MacOSXUpdCombo10.6.3.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.1
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.1
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.2
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.2
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.3
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.3
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.4
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.4
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.5
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.5
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.6
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.6
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.7
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.7
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.5.8
-
Apple SecUpdSrvr2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.5.8
-
Apple SecUpd2010-002Leo.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.6.1
-
Apple MacOSXServerUpdCombo10.6.3.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.6.1
-
Apple MacOSXUpdCombo10.6.3.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X 10.6.2
-
Apple MacOSXUpd10.6.3.dmg
http://www.apple.com/support/downloads/
Apple Mac OS X Server 10.6.2
-
Apple MacOSXServerUpd10.6.3.dmg
http://www.apple.com/support/downloads/
References
Apple Mac OS X PS Normalizer PostScript File Stack Buffer Overflow Vulnerability
References:
References:
- Mac OS X Homepage (Apple)