First published: Wed May 13 2009(Updated: )
Stack-based buffer overflow in telnet in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long hostname for a telnet server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | =10.5.2 | |
macOS Yosemite | =10.5.6 | |
Apple Mac OS X Server | =10.4.11 | |
macOS Yosemite | =10.5.5 | |
Apple Mac OS X Server | =10.5.5 | |
macOS Yosemite | =10.5.1 | |
Apple Mac OS X Server | =10.5.1 | |
Apple Mac OS X Server | =10.5.6 | |
macOS Yosemite | =10.5.3 | |
macOS Yosemite | =10.5.0 | |
Apple Mac OS X Server | =10.5.0 | |
Apple Mac OS X Server | =10.5.3 | |
Apple Mac OS X Server | =10.5.4 | |
macOS Yosemite | =10.5.2 | |
macOS Yosemite | =10.4.11 | |
macOS Yosemite | =10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0158 is rated as critical due to the potential for arbitrary code execution and denial of service.
To fix CVE-2009-0158, update your Apple Mac OS X to version 10.5.7 or later, which addresses this vulnerability.
CVE-2009-0158 affects Apple Mac OS X versions 10.4.11 and 10.5 up to 10.5.6.
CVE-2009-0158 exploits a stack-based buffer overflow vulnerability caused by handling long hostnames in the telnet application.
The potential impacts of CVE-2009-0158 include unauthorized remote code execution and application crashes.