APP: Apple mDNSResponder Buffer Overflow

This signature detects attempts to exploit a known vulnerability in Mac OSX's mDNSResponder. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the root user.

Extended Description

Apple Mac OS X is prone to a remote buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Successfully exploiting this issue allows remote attackers to execute arbitrary machine code with superuser privileges, facilitating the complete compromise of affected computers. Failed exploit attempts likely result in a denial-of-service condition. Apple Mac OS X 10.4.0 through 10.4.9 are vulnerable to this issue. This issue was originally included in BID 24144 (Apple Mac OS X 2007-005 Multiple Security Vulnerabilities), but has been split into its own record. The vendor reports this issue also affects Apple TV versions prior to 1.1.

Affected Products

Apple tv,Gentoo linux

References

BugTraq: 24159

CVE: CVE-2007-2386

Short Name
APP:UPNP:APPLE-MDNS
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Apple Buffer CVE-2007-2386 Overflow bid:24159 mDNSResponder
Release Date
05/23/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
Port
UDP/1024-65535
False Positive
Unknown
Vendors

Apple

Gentoo

CVSS Score

9.4

Found a potential security threat?