First published: Wed Dec 17 2008(Updated: )
Incomplete blacklist vulnerability in the Quarantine feature in CoreTypes in Apple Mac OS X 10.5 before 10.5.6 allows user-assisted remote attackers to execute arbitrary code via an executable file with the content type indicating no application association for the file, which does not trigger a "potentially unsafe" warning message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | =10.5.2 | |
Apple Mac OS X Server | <=10.5.5 | |
macOS Yosemite | =10.5.1 | |
Apple Mac OS X Server | =10.5.1 | |
macOS Yosemite | =10.5.3 | |
Apple Mac OS X Server | =10.5.3 | |
macOS Yosemite | =10.5 | |
Apple Mac OS X Server | =10.5.4 | |
macOS Yosemite | =10.5.2 | |
macOS Yosemite | <=10.5.5 | |
Apple Mac OS X Server | =10.5 | |
macOS Yosemite | =10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4234 is considered a medium severity vulnerability due to the potential for remote code execution.
To fix CVE-2008-4234, it is recommended to update to Apple Mac OS X 10.5.6 or later.
CVE-2008-4234 exploits an incomplete blacklist vulnerability in the Quarantine feature of Apple Mac OS X.
CVE-2008-4234 affects macOS versions 10.5 to 10.5.5.
No, CVE-2008-4234 requires user-assisted actions to exploit the vulnerability.