header-logo
Suggest Exploit
vendor:
Mac OS X
by:
SecurityFocus
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Mac OS X
Affected Version From: Mac OS X 10.3.9
Affected Version To: Mac OS X 10.4.2
Patch Exists: YES
Related CWE: CVE-2005-1790
CPE: o:apple:mac_os_x:10.3.9
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Mac OS X
2005

Apple Mac OS X AirPort Wireless Driver Multiple Buffer Overflow Vulnerabilities

The Apple Mac OS X AirPort wireless driver is prone to multiple buffer-overflow vulnerabilities because it fails to perform sufficient bounds checking before copying data to finite-sized buffers. An attacker can exploit these issues to have arbitrary machine code execute with kernel-level privileges. One of the issues allows code execution in the context of an application using the wireless API. This may lead to denial-of-service conditions or the complete compromise of the affected computer.

Mitigation:

Apply the appropriate vendor-supplied patch.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/20144/info

The Apple Mac OS X AirPort wireless driver is prone to multiple buffer-overflow vulnerabilities because it fails to perform sufficient bounds checking before copying data to finite-sized buffers.

An attacker can exploit these issues to have arbitrary machine code execute with kernel-level privileges. One of the issues allows code execution in the context of an application using the wireless API. This may lead to denial-of-service conditions or the complete compromise of the affected computer.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28643.zip