CVE-2006-6652

Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=305391 Vendor Advisory
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-027.txt.asc Patch Vendor Advisory
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html Mailing List Third Party Advisory
http://secunia.com/advisories/23178 Third Party Advisory
http://secunia.com/advisories/24966 Third Party Advisory
http://securitytracker.com/id?1017386 Patch Third Party Advisory VDB Entry
http://www.osvdb.org/31781 Broken Link
http://www.securityfocus.com/bid/21377 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-109A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/1470 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/30670 Third Party Advisory VDB Entry
http://docs.info.apple.com/article.html?artnum=305391 Vendor Advisory
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-027.txt.asc Patch Vendor Advisory
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html Mailing List Third Party Advisory
http://secunia.com/advisories/23178 Third Party Advisory
http://secunia.com/advisories/24966 Third Party Advisory
http://securitytracker.com/id?1017386 Patch Third Party Advisory VDB Entry
http://www.osvdb.org/31781 Broken Link
http://www.securityfocus.com/bid/21377 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-109A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/1470 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/30670 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://docs.info.apple.com/article.html?artnum=305391 - Vendor Advisory () http://docs.info.apple.com/article.html?artnum=305391 - Vendor Advisory
References () http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-027.txt.asc - Patch, Vendor Advisory () http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-027.txt.asc - Patch, Vendor Advisory
References () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - Vendor Advisory () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - Vendor Advisory
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html - Mailing List, Third Party Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/23178 - Third Party Advisory () http://secunia.com/advisories/23178 - Third Party Advisory
References () http://secunia.com/advisories/24966 - Third Party Advisory () http://secunia.com/advisories/24966 - Third Party Advisory
References () http://securitytracker.com/id?1017386 - Patch, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1017386 - Patch, Third Party Advisory, VDB Entry
References () http://www.osvdb.org/31781 - Broken Link () http://www.osvdb.org/31781 - Broken Link
References () http://www.securityfocus.com/bid/21377 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/21377 - Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2007/1470 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/1470 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30670 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/30670 - Third Party Advisory, VDB Entry

Information

Published : 2006-12-20 02:28

Updated : 2024-11-21 00:23


NVD link : CVE-2006-6652

Mitre link : CVE-2006-6652

CVE.ORG link : CVE-2006-6652


JSON object : View

Products Affected

apple

  • mac_os_x

netbsd

  • netbsd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer