vendor:
Mac OS X
by:
Kevin Finisterre
7,5
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: Mac OS X
Affected Version From: OSX 10.4.6 8l127
Affected Version To: OSX 10.4 8A428
Patch Exists: NO
Related CWE: N/A
CPE: o:apple:mac_os_x
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PowerPC G4, PowerPC G3
2006
FailureToLaunch-ppc.pl
This is just a vanilla format string exploit for OSX on ppc. We overwrite a saved return addy with our shellcode address. This code currently overwrites a saved return addy with the stack location of our seteuid() / execve() shellcode.
Mitigation:
Ensure that user input is properly validated and sanitized.