First published: Wed Dec 17 2008(Updated: )
The strptime API in Libsystem in Apple Mac OS X before 10.5.6 allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a crafted date string, related to improper memory allocation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Server | =10.5.2 | |
Apple macOS Server | =10.4.11 | |
Apple macOS Server | <=10.5.5 | |
Apple iOS and macOS | =10.5.1 | |
Apple macOS Server | =10.5.1 | |
Apple iOS and macOS | =10.5.3 | |
Apple macOS Server | =10.5.3 | |
Apple iOS and macOS | =10.5 | |
Apple macOS Server | =10.5.4 | |
Apple iOS and macOS | =10.5.2 | |
Apple iOS and macOS | =10.4.11 | |
Apple iOS and macOS | <=10.5.5 | |
Apple macOS Server | =10.5 | |
Apple iOS and macOS | =10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4221 has a severity rating that indicates it can lead to denial of service or arbitrary code execution.
To fix CVE-2008-4221, ensure you update to the latest version of macOS or Apple Mac OS X Server that addresses this vulnerability.
CVE-2008-4221 affects macOS versions up to and including 10.5.5 and includes specific releases like 10.4.11 and 10.5.2.
CVE-2008-4221 can be exploited through crafted date strings that lead to memory corruption or application crashes.
There are no widely reported exploits for CVE-2008-4221, but its potential for arbitrary code execution makes it a concern.