First published: Tue Sep 16 2008(Updated: )
Multiple integer overflows in the SearchKit API in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via vectors associated with "passing untrusted input" to unspecified API functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | =10.5.2 | |
Apple Mac OS X Server | =10.4.11 | |
macOS Yosemite | =10.5.1 | |
Apple Mac OS X Server | =10.5.1 | |
macOS Yosemite | =10.5.3 | |
Apple Mac OS X Server | =10.5.3 | |
macOS Yosemite | =10.5 | |
Apple Mac OS X Server | =10.5.4 | |
macOS Yosemite | =10.5.2 | |
macOS Yosemite | =10.4.11 | |
Apple Mac OS X Server | =10.5 | |
macOS Yosemite | =10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3616 is considered a high severity vulnerability due to the potential for denial of service and arbitrary code execution.
To fix CVE-2008-3616, users should update their Apple Mac OS X systems to the latest version that addresses the vulnerability.
CVE-2008-3616 affects Apple Mac OS X versions 10.4.11, 10.5.1, 10.5.2, 10.5.3, and 10.5.4.
CVE-2008-3616 can facilitate denial of service attacks or allow attackers to execute arbitrary code on affected systems.
There is no known workaround for CVE-2008-3616, updating to a patched version is recommended.