First published: Sat Dec 31 2005(Updated: )
Heap-based buffer overflow in LibSystem in Mac OS X 10.4 through 10.4.5 allows context-dependent attackers to execute arbitrary code by causing an application that uses LibSystem to request a large amount of memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.4.3 | |
Apple Mac OS X Server | =10.4.3 | |
macOS Yosemite | =10.4.1 | |
Apple Mac OS X Server | =10.4.2 | |
Apple Mac OS X Server | =10.4.4 | |
Apple Mac OS X Server | =10.4.1 | |
macOS Yosemite | =10.4.4 | |
Apple Mac OS X Server | =10.4 | |
Apple Mac OS X Server | =10.4.5 | |
macOS Yosemite | =10.4 | |
macOS Yosemite | =10.4.5 | |
macOS Yosemite | =10.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3706 has a severity rating that may allow attackers to execute arbitrary code, indicating a critical risk to affected systems.
To fix CVE-2005-3706, users should upgrade to the latest version of Mac OS X that addresses this vulnerability.
CVE-2005-3706 affects Mac OS X versions 10.4 through 10.4.5.
The vulnerability in CVE-2005-3706 is caused by a heap-based buffer overflow in LibSystem, which allows for memory over-allocation.
CVE-2005-3706 can be exploited by context-dependent attackers who trigger the vulnerability by making applications request excessive memory.