[原文]Buffer overflow in the Xsan Filesystem driver on Mac OS X 10.4.7 and OS X Server 10.4.7 allows local users with Xsan write access, to execute arbitrary code via unspecified vectors related to "processing a path name."
Apple Mac OS X Xsan Filesystem Path Name Processing Overflow
Local Access Required
Loss of Integrity
A local overflow exists in Mac OS X. The included Xsan filesystem driver fails to validate path names resulting in a buffer overflow. With a specially crafted pathname, an attacker can cause arbitrary code execution resulting in a loss of integrity.
Upgrade to Xsan filesystem driver version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Andrew Wellington is credited with discovering this vulnerability.
Apple Xsan 1.3
Apple Xsan 1.2
Apple Xsan 1.0
Apple Xsan 1.4
Apple Xsan 1.4
Apple Xsan filesystem is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it into an insufficiently sized buffer.
This issue may allow remote attackers to execute arbitrary machine code with system privileges on computers directly attached to the vulnerable filesystem. Failed exploit attempts will likely crash the system, denying service to legitimate users.
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: firstname.lastname@example.org.
The vendor released version 1.4 to address this issue. Please see the references for more information.