CVE-2006-5710
🟡 Monitoruj
Przepełnienie bufora w sterowniku Airport w Mac OS X umożliwia zdalne wykonanie kodu.
CVSS
7.5
EPSS
33.6%
Exploit
poc
Vendor
apple
Opis źródłowy (NVD)
The Airport driver for certain Orinoco based Airport cards in Darwin kernel 8.8.0 in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to execute arbitrary code via an 802.11 probe response frame without any valid information element (IE) fields after the header, which triggers a heap-based buffer overflow.
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 33.6% |
| Opublikowano (NVD) | 2006-11-04 01:07:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- http://docs.info.apple.com/article.html?artnum=304829 (cve@mitre.org)
- http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html (cve@mitre.org)
- http://projects.info-pull.com/mokb/MOKB-01-11-2006.html (cve@mitre.org) [Exploit]
- http://secunia.com/advisories/22679 (cve@mitre.org) [Exploit, Vendor Advisory]
- http://secunia.com/advisories/23155 (cve@mitre.org)
- http://securitytracker.com/id?1017151 (cve@mitre.org)
- http://www.kb.cert.org/vuls/id/191336 (cve@mitre.org) [US Government Resource]
- http://www.osvdb.org/30180 (cve@mitre.org)
- http://www.securityfocus.com/bid/20862 (cve@mitre.org) [Exploit]
- http://www.us-cert.gov/cas/techalerts/TA06-333A.html (cve@mitre.org) [US Government Resource]
- http://www.vupen.com/english/advisories/2006/4313 (cve@mitre.org) [Vendor Advisory]
- http://www.vupen.com/english/advisories/2006/4750 (cve@mitre.org) [Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29965 (cve@mitre.org)