{"vuid":"VU#258744","idnumber":"258744","name":"Apple Mac OS X Finder fails to properly handle malformed .DS_Store files","keywords":["Apple","Mac","OS X","Finder","heap overflow","arbitrary code execution","DoS","denial of service",".DS_Store files","apple-2006-007"],"overview":"Apple Finder fails to properly handle malformed .DS_Store files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":".DS_Store files are hidden files used by Apple Finder to control the display of a folder and its contents. According to Apple Security Advisory 2006-007: A heap buffer overflow may be triggered when the Finder is used to browse a directory containing a corrupt \".DS_Store\" file. By enticing a user to browse a directory containing a maliciously-crafted \".DS_Store\" file, an attacker may be able to trigger the overflow. This could lead to an application crash or arbitrary code execution with the privileges of the user running Finder. \".DS_Store\" files may be included in archives, on disk images, and on network file systems.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running Apple Finder.","resolution":"Apply Apple Updates \nApple advises all users to apply Apple Security Update 2006-007, as it fixes this and other critical security flaws.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Apple Security Update \n2006-007","author":"This document was written by Jeff Gennari based on information from Apple.","public":["http://docs.info.apple.com/article.html?artnum=304829","http://secunia.com/advisories/23155/"],"cveids":["CVE-2006-4402"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-29T13:22:09Z","publicdate":"2006-11-28T00:00:00Z","datefirstpublished":"2006-11-29T15:03:14Z","dateupdated":"2006-11-30T16:33:50Z","revision":31,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"18","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"26.325","cam_scorecurrentwidelyknown":"50.625","cam_scorecurrentwidelyknownexploited":"91.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":26.325,"vulnote":null}