ID
VAR-E-201003-0567
CVE
cve_id: | CVE-2010-0962 | Trust: 0.3 |
TITLE
Multiple Apple Wireless Products FTP Port Forward Security Bypass Vulnerability
Trust: 0.3
DESCRIPTION
Multiple Apple wireless products are prone to a security-bypass vulnerability.
An attacker can exploit this issue to perform anonymous port scans on a victim's computer and send unsolicited emails and news. Other attacks are also possible.
The following products are affected:
Airport Express Firmware version 7.5
Airport Extreme Firmware version 7.5
Time Capsule Firmware version 7.5
Other products and versions may also be affected.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.6.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.6.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.8 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.7 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.6 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.5 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.4 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.6 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.8 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.7 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.6 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.6 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport express | scope: | eq | version: | 0 | Trust: 0.3 |
EXPLOIT
An attacker can exploit this issue by using readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
Sabahattin Gucukoglu
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2010-0962 | Trust: 0.3 |
db: | BID | id: | 38543 | Trust: 0.3 |
REFERENCES
url: | http://www.apple.com | Trust: 0.3 |
SOURCES
db: | BID | id: | 38543 |
LAST UPDATE DATE
2022-07-27T09:22:36.510000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 38543 | date: | 2015-04-13T21:02:00 |
SOURCES RELEASE DATE
db: | BID | id: | 38543 | date: | 2010-03-04T00:00:00 |