2012-09-20 23:55:02 2017-08-29 03:32:03

Mail in Apple Mac OS X before 10.7.5 does not properly handle embedded web plugins, which allows remote attackers to execute arbitrary plugin code via an e-mail message that triggers the loading of a third-party plugin.

Vector

NETWORK

Complexity

MEDIUM

Authentication

NONE

Confidentiality

PARTIAL

Integrity

PARTIAL

Availability

PARTIAL
Apple Mac OS X Server 10.2.2 Apple Mac OS X Server 10.2.1 Apple Mac OS X Server 10.6.4 Apple Mac OS X Server 10.2.8 Apple Mac OS X Server 10.6.3 Apple Mac OS X Server 10.2.7 Apple Mac OS X Server 10.6.6 Apple Mac OS X Server 10.6.5 Apple Mac OS X Server 10.6.0 Apple Mac OS X Server 10.2.4 Apple Mac OS X Server 10.2.3 Apple Mac OS X Server 10.6.2 Apple Mac OS X Server 10.2.6 Apple Mac OS X Server 10.6.1 Apple Mac OS X Server 10.2.5 Apple Mac OS X Server 10.4.10 Apple Mac OS X 10.3.7 Apple Mac OS X 10.7.3 Apple Mac OS X 10.3.0 Apple Mac OS X Server 10.4.11 Apple Mac OS X 10.3.1 Apple Mac OS X Server 10.2.0 Apple Mac OS X 10.3.4 Apple Mac OS X 10.7.0 Apple Mac OS X 10.3.2 Apple Mac OS X 10.3.5 Apple Mac OS X 10.7.1 Apple Mac OS X 10.7.4 Apple Mac OS X 10.3.8 Apple Mac OS X 10.3.3 Apple Mac OS X 10.3.6 Apple Mac OS X 10.7.2 Apple Mac OS X 10.3.9 Apple Mac OS X Server 10.1 Apple Mac OS X Server 10.2 Apple Mac OS X Server 10.0 Apple Mac OS X Server 10.5 Apple Mac OS X Server 10.3 Apple Mac OS X Server 10.3.1 Apple Mac OS X Server 10.3.0 Apple Mac OS X Server 10.7.3 Apple Mac OS X Server 10.3.7 Apple Mac OS X Server 10.7.2 Apple Mac OS X Server 10.3.6 Apple Mac OS X 10.4.11 Apple Mac OS X Server 10.3.9 Apple Mac OS X Server 10.7.4 Apple Mac OS X Server 10.3.8 Apple Mac OS X Server 10.3.3 Apple Mac OS X Server 10.3.2 Apple Mac OS X Server 10.7.1 Apple Mac OS X Server 10.3.5 Apple Mac OS X Server 10.7.0 Apple Mac OS X Server 10.3.4 Apple Mac OS X 10.4.10 Apple Mac OS X 10.4.6 Apple Mac OS X 10.0.0 Apple Mac OS X 10.0.3 Apple Mac OS X 10.0.1 Apple Mac OS X 10.0.4 Apple Mac OS X 10.4.0 Apple Mac OS X 10.0.2 Apple Mac OS X Server 10.4 Apple Mac OS X 10.4.9 Apple Mac OS X 10.4.3 Apple Mac OS X 10.4.1 Apple Mac OS X 10.4.4 Apple Mac OS X 10.4.7 Apple Mac OS X 10.4.2 Apple Mac OS X 10.4.5 Apple Mac OS X 10.4.8 Apple Mac OS X Server 10.4.9 Apple Mac OS X Server 10.0.1 Apple Mac OS X Server 10.4.0 Apple Mac OS X Server 10.0.4 Apple Mac OS X Server 10.0.3 Apple Mac OS X Server 10.0.0 Apple Mac OS X Server 10.4.6 Apple Mac OS X Server 10.4.5 Apple Mac OS X Server 10.4.8 Apple Mac OS X Server 10.4.7 Apple Mac OS X Server 10.4.2 Apple Mac OS X Server 10.4.1 Apple Mac OS X Server 10.4.4 Apple Mac OS X Server 10.4.3 Apple Mac OS X 10.2 Apple Mac OS X 10.5.5 Apple Mac OS X 10.1 Apple Mac OS X 10.1.2 Apple Mac OS X 10.3 Apple Mac OS X 10.0 Apple Mac OS X 10.1.0 Apple Mac OS X 10.1.3 Apple Mac OS X 10.5 Apple Mac OS X 10.1.1 Apple Mac OS X 10.4 Apple Mac OS X Server 10.0.2 Apple Mac OS X 10.5.8 Apple Mac OS X 10.5.2 Apple Mac OS X 10.1.4 Apple Mac OS X 10.5.0 Apple Mac OS X 10.5.3 Apple Mac OS X 10.5.6 Apple Mac OS X 10.1.5 Apple Mac OS X 10.5.1 Apple Mac OS X 10.5.4 Apple Mac OS X 10.5.7 Apple Mac OS X Server 10.6.7 Apple Mac OS X Server 10.6.8 Apple Mac OS X 10.6.6 Apple Mac OS X 10.2.7 Apple Mac OS X 10.6.3 Apple Mac OS X 10.6.0 Apple Mac OS X 10.2.4 Apple Mac OS X 10.6.5 Apple Mac OS X 10.6.2 Apple Mac OS X 10.2.6 Apple Mac OS X 10.2.3 Apple Mac OS X 10.6.1 Apple Mac OS X 10.2.5 Apple Mac OS X 10.6.8 Apple Mac OS X 10.6.7 Apple Mac OS X Server 10.1.1 Apple Mac OS X 10.2.0 Apple Mac OS X 10.2.2 Apple Mac OS X 10.2.1 Apple Mac OS X 10.6.4 Apple Mac OS X 10.2.8 Apple Mac OS X Server 10.5.2 Apple Mac OS X Server 10.5.3 Apple Mac OS X Server 10.1.4 Apple Mac OS X Server 10.5.0 Apple Mac OS X Server 10.1.5 Apple Mac OS X Server 10.5.1 Apple Mac OS X Server 10.5.6 Apple Mac OS X Server 10.5.7 Apple Mac OS X Server 10.5.4 Apple Mac OS X Server 10.5.5 Apple Mac OS X Server 10.1.2 Apple Mac OS X Server 10.1.3 Apple Mac OS X Server 10.1.0 Apple Mac OS X Server 10.5.8

Improper Input Validation (ID 20)

Related CAPEC 58 Buffer Overflow via Environment Variables (CAPEC-ID 10) Server Side Include (SSI) Injection (CAPEC-ID 101) Cross Zone Scripting (CAPEC-ID 104) Cross Site Scripting through Log Files (CAPEC-ID 106) Command Line Execution through SQL Injection (CAPEC-ID 108) Object Relational Mapping Injection (CAPEC-ID 109) SQL Injection through SOAP Parameter Tampering (CAPEC-ID 110) Subverting Environment Variable Values (CAPEC-ID 13) Format String Injection (CAPEC-ID 135) LDAP Injection (CAPEC-ID 136) Relative Path Traversal (CAPEC-ID 139) Client-side Injection-induced Buffer Overflow (CAPEC-ID 14) Variable Manipulation (CAPEC-ID 171) Embedding Scripts in Non-Script Elements (CAPEC-ID 18) Flash Injection (CAPEC-ID 182) Cross-Site Scripting Using Alternate Syntax (CAPEC-ID 199) Exploiting Trust in Client (aka Make the Client Invisible) (CAPEC-ID 22) XML Nested Payloads (CAPEC-ID 230) XML Oversized Payloads (CAPEC-ID 231) Filter Failure through Buffer Overflow (CAPEC-ID 24) Cross-Site Scripting via Encoded URI Schemes (CAPEC-ID 244) XML Injection (CAPEC-ID 250) Environment Variable Manipulation (CAPEC-ID 264) Global variable manipulation (CAPEC-ID 265) Leverage Alternate Encoding (CAPEC-ID 267) Fuzzing (CAPEC-ID 28) Using Leading 'Ghost' Character Sequences to Bypass Input Filters (CAPEC-ID 3) Accessing/Intercepting/Modifying HTTP Cookies (CAPEC-ID 31) Embedding Scripts in HTTP Query Strings (CAPEC-ID 32) MIME Conversion (CAPEC-ID 42) Exploiting Multiple Input Interpretation Layers (CAPEC-ID 43) Buffer Overflow via Symbolic Links (CAPEC-ID 45) Overflow Variables and Tags (CAPEC-ID 46) Buffer Overflow via Parameter Expansion (CAPEC-ID 47) Signature Spoof (CAPEC-ID 473) XML Client-Side Attack (CAPEC-ID 484) Embedding NULL Bytes (CAPEC-ID 52) Postfix, Null Terminate, and Backslash (CAPEC-ID 53) Simple Script Injection (CAPEC-ID 63) Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64) SQL Injection (CAPEC-ID 66) String Format Overflow in syslog() (CAPEC-ID 67) Blind SQL Injection (CAPEC-ID 7) Using Unicode Encoding to Bypass Validation Logic (CAPEC-ID 71) URL Encoding (CAPEC-ID 72) User-Controlled Filename (CAPEC-ID 73) Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78) Using Slashes in Alternate Encoding (CAPEC-ID 79) Buffer Overflow in an API Call (CAPEC-ID 8) Using UTF-8 Encoding to Bypass Validation Logic (CAPEC-ID 80) Web Logs Tampering (CAPEC-ID 81) XPath Injection (CAPEC-ID 83) AJAX Fingerprinting (CAPEC-ID 85) Embedding Script (XSS) in HTTP Headers (CAPEC-ID 86) OS Command Injection (CAPEC-ID 88) Buffer Overflow in Local Command-Line Utilities (CAPEC-ID 9) XSS in IMG Tags (CAPEC-ID 91) XML Parser Attack (CAPEC-ID 99)