CVE-2006-1220

Severity

46%

Complexity

39%

Confidentiality

106%

Integer overflow in the mach_msg_send function in the kernel for Mac OS X might allow local users to execute arbitrary code via unknown attack vectors related to a large message header size, which leads to a heap-based buffer overflow.

Integer overflow in the mach_msg_send function in the kernel for Mac OS X might allow local users to execute arbitrary code via unknown attack vectors related to a large message header size, which leads to a heap-based buffer overflow.

CVSS 2.0 Base Score 4.6. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P).

Overview

Type

Apple Mac OS X

First reported 18 years ago

2006-03-14 02:02:00

Last updated 11 years ago

2013-09-06 04:53:00

Affected Software

Apple Mac OS X 10.0

10.0

Apple Mac OS X 10.0.1

10.0.1

Apple Mac OS X 10.0.2

10.0.2

Apple Mac OS X 10.0.3

10.0.3

Apple Mac OS X 10.0.4

10.0.4

Apple Mac OS X 10.1

10.1

Apple Mac OS X 10.1.1

10.1.1

Apple Mac OS X 10.1.2

10.1.2

Apple Mac OS X 10.1.3

10.1.3

Apple Mac OS X 10.1.4

10.1.4

Apple Mac OS X 10.1.5

10.1.5

Apple Mac OS X 10.2

10.2

Apple Mac OS X 10.2.1

10.2.1

Apple Mac OS X 10.2.2

10.2.2

Apple Mac OS X 10.2.3

10.2.3

Apple Mac OS X 10.2.4

10.2.4

Apple Mac OS X 10.2.5

10.2.5

Apple Mac OS X 10.2.6

10.2.6

Apple Mac OS X 10.2.7

10.2.7

Apple Mac OS X 10.2.8

10.2.8

Apple Mac OS X 10.3

10.3

Apple Mac OS X 10.3.1

10.3.1

Apple Mac OS X 10.3.2

10.3.2

Apple Mac OS X 10.3.3

10.3.3

Apple Mac OS X 10.3.4

10.3.4

Apple Mac OS X 10.3.5

10.3.5

Apple Mac OS X 10.3.6

10.3.6

Apple Mac OS X 10.3.7

10.3.7

Apple Mac OS X 10.3.8

10.3.8

Apple Mac OS X 10.3.9

10.3.9

Apple Mac OS X 10.4

10.4

Apple Mac OS X 10.4.1

10.4.1

Apple Mac OS X 10.4.2

10.4.2

Apple Mac OS X 10.4.3

10.4.3

Apple Mac OS X 10.4.4

10.4.4

Apple Mac OS X 10.4.5

10.4.5

Apple Mac OS X Server 10.0

10.0

Apple Mac OS X Server 10.1

10.1

Apple Mac OS X Server 10.1.1

10.1.1

Apple Mac OS X Server 10.1.2

10.1.2

Apple Mac OS X Server 10.1.3

10.1.3

Apple Mac OS X Server 10.1.4

10.1.4

Apple Mac OS X Server 10.1.5

10.1.5

Apple Mac OS X Server 10.2

10.2

Apple Mac OS X Server 10.2.1

10.2.1

Apple Mac OS X Server 10.2.2

10.2.2

Apple Mac OS X Server 10.2.3

10.2.3

Apple Mac OS X Server 10.2.4

10.2.4

Apple Mac OS X Server 10.2.5

10.2.5

Apple Mac OS X Server 10.2.6

10.2.6

Apple Mac OS X Server 10.2.7

10.2.7

Apple Mac OS X Server 10.2.8

10.2.8

Apple Mac OS X Server 10.3

10.3

Apple Mac OS X Server 10.3.1

10.3.1

Apple Mac OS X Server 10.3.2

10.3.2

Apple Mac OS X Server 10.3.3

10.3.3

Apple Mac OS X Server 10.3.4

10.3.4

Apple Mac OS X Server 10.3.5

10.3.5

Apple Mac OS X Server 10.3.6

10.3.6

Apple Mac OS X Server 10.3.7

10.3.7

Apple Mac OS X Server 10.3.8

10.3.8

Apple Mac OS X Server 10.3.9

10.3.9

Apple Mac OS X Server 10.4

10.4

Apple Mac OS X Server 10.4.1

10.4.1

Apple Mac OS X Server 10.4.2

10.4.2

Apple Mac OS X Server 10.4.3

10.4.3

Apple Mac OS X Server 10.4.4

10.4.4

Apple Mac OS X Server 10.4.5

10.4.5

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.