First published: Tue Mar 14 2006(Updated: )
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.4.3 | |
Apple Mac OS X Server | =10.4.3 | |
macOS Yosemite | =10.4.1 | |
Apple Mac OS X Server | =10.4.2 | |
Apple Mac OS X Server | =10.4.4 | |
Apple Mac OS X Server | =10.4.1 | |
macOS Yosemite | =10.4.4 | |
Apple Mac OS X Server | =10.4 | |
Apple Mac OS X Server | =10.4.5 | |
macOS Yosemite | =10.4 | |
macOS Yosemite | =10.4.5 | |
macOS Yosemite | =10.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0396 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To address CVE-2006-0396, users should update to a version of Mac OS X that is not affected, specifically versions beyond 10.4.5.
CVE-2006-0396 affects Mail in Apple Mac OS X versions 10.4 through 10.4.5.
CVE-2006-0396 allows remote attackers to execute arbitrary code by exploiting a buffer overflow in the Mail application.
Disabling the Mail application or being cautious with email attachments may serve as temporary workarounds for CVE-2006-0396.