First published: Tue Jun 27 2006(Updated: )
Format string vulnerability in the CF_syslog function launchd in Apple Mac OS X 10.4 up to 10.4.6 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a syslog call in the logging facility, as demonstrated by using a crafted plist file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.4.3 | |
Apple Mac OS X Server | =10.4.3 | |
macOS Yosemite | =10.4.1 | |
Apple Mac OS X Server | =10.4.2 | |
Apple Mac OS X Server | =10.4.4 | |
Apple Mac OS X Server | =10.4.1 | |
macOS Yosemite | =10.4.4 | |
Apple Mac OS X Server | =10.4 | |
Apple Mac OS X Server | =10.4.5 | |
macOS Yosemite | =10.4 | |
Apple Mac OS X Server | =10.4.6 | |
macOS Yosemite | =10.4.6 | |
macOS Yosemite | =10.4.5 | |
macOS Yosemite | =10.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1471 is classified as a high severity vulnerability due to its potential to allow local users to execute arbitrary code.
To mitigate CVE-2006-1471, users should update their Apple Mac OS X software to version 10.4.7 or later.
CVE-2006-1471 affects Apple Mac OS X versions 10.4 through 10.4.6 and their Server counterparts.
CVE-2006-1471 is caused by a format string vulnerability in the CF_syslog function of the launchd daemon.
No, CVE-2006-1471 is a local vulnerability, meaning it requires local access to the system to exploit.