First published: Thu Jun 17 2010(Updated: )
Directory traversal vulnerability in iChat in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, when AIM is used, allows remote attackers to create arbitrary files via directory traversal sequences in an inline image-transfer operation.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | =10.5.8 | |
Apple Mac OS X | =10.6.0 | |
Apple Mac OS X | =10.6.1 | |
Apple Mac OS X | =10.6.2 | |
Apple Mac OS X | =10.6.3 | |
Apple Mac OS X Server | =10.5.8 | |
Apple Mac OS X Server | =10.6.0 | |
Apple Mac OS X Server | =10.6.1 | |
Apple Mac OS X Server | =10.6.2 | |
Apple Mac OS X Server | =10.6.3 | |
Aol Aim | =1.0 | |
Aol Aim | =1.06 | |
Aol Aim | =1.7 | |
Aol Aim | =2.0 | |
Aol Aim | =2.1 | |
Aol Aim | =3.0 | |
Aol Aim | =3.5 | |
Aol Aim | =4.1 | |
Aol Aim | =4.2 | |
Aol Aim | =4.3 | |
Aol Aim | =4.4 | |
Aol Aim | =4.7 | |
Aol Aim | =4.8 | |
Aol Aim | =5.0 | |
Aol Aim | =5.1 | |
Aol Aim | =5.2 | |
Aol Aim | =5.5 | |
Aol Aim | =5.9 | |
Aol Aim | =6.0 | |
Aol Aim | =6.2 | |
Aol Aim | =6.5 | |
Aol Aim | =6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.