ID

VAR-200405-0017


CVE

CVE-2004-0428


TITLE

Apple Mac OS X AppleFileServer fails to properly handle certain authentication requests

Trust: 0.8

sources: CERT/CC: VU#648406

DESCRIPTION

Unknown vulnerability in CoreFoundation in Mac OS X 10.3.3 and Mac OS X 10.3.3 Server, related to "the handling of an environment variable," has unknown attack vectors and unknown impact. There is a buffer overflow vulnerability in the way Apple's AppleFileServer handles certain authentication requests. This vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code. It has been reported that CoreFoundation is affected by a local unspecified large input vulnerability. This issue is apparently due to an inability of certain library-defined classes to handle large input. Currently sufficient information does not exist to provide more details. This BID will be updated when more information becomes available. This issue was previously disclosed in a multiple BID 10268 (Apple OS X Multiple Unspecified Large Input Vulnerabilities), however, it is being assigned a new BID

Trust: 2.7

sources: NVD: CVE-2004-0428 // CERT/CC: VU#648406 // JVNDB: JVNDB-2004-000936 // BID: 10270 // VULHUB: VHN-8858

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.2.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.8

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.8

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.3.2

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.6

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.5

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.3.1

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.8

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.3.3

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.1

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.3

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.3

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.1

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.1

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.3.1

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.3

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.8

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.4

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.7

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.3.1

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.3

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.6

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.2

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.7

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.6

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.7

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.3

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.3.2

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.2

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.3.3

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.3

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.2

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.3.3

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.4

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.4

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.5

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.3.2

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.5

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

sources: CERT/CC: VU#648406 // BID: 10270 // JVNDB: JVNDB-2004-000936 // CNNVD: CNNVD-200405-007 // NVD: CVE-2004-0428

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-0428
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#648406
value: 27.42

Trust: 0.8

NVD: CVE-2004-0428
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200405-007
value: MEDIUM

Trust: 0.6

VULHUB: VHN-8858
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-0428
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-8858
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#648406 // VULHUB: VHN-8858 // JVNDB: JVNDB-2004-000936 // CNNVD: CNNVD-200405-007 // NVD: CVE-2004-0428

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2004-000936 // NVD: CVE-2004-0428

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200405-007

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 10270 // CNNVD: CNNVD-200405-007

PATCH

title:top pageurl:https://www.apple.com/

Trust: 0.8

sources: JVNDB: JVNDB-2004-000936

EXTERNAL IDS

db:NVDid:CVE-2004-0428

Trust: 3.6

db:SECUNIAid:11539

Trust: 3.3

db:BIDid:10270

Trust: 2.8

db:SECTRACKid:1010045

Trust: 2.5

db:AUSCERTid:ESB-2004.0314

Trust: 1.7

db:SECTRACKid:1010039

Trust: 0.8

db:CERT/CCid:VU#648406

Trust: 0.8

db:JVNDBid:JVNDB-2004-000936

Trust: 0.8

db:CNNVDid:CNNVD-200405-007

Trust: 0.7

db:XFid:16051

Trust: 0.6

db:APPLEid:APPLE-SA-2004-05-03

Trust: 0.6

db:VULHUBid:VHN-8858

Trust: 0.1

sources: CERT/CC: VU#648406 // VULHUB: VHN-8858 // BID: 10270 // JVNDB: JVNDB-2004-000936 // CNNVD: CNNVD-200405-007 // NVD: CVE-2004-0428

REFERENCES

url:http://lists.virus.org/macsec-0405/msg00000.html

Trust: 2.5

url:http://www.securityfocus.com/bid/10270

Trust: 2.5

url:http://securitytracker.com/id?1010045

Trust: 2.5

url:http://secunia.com/advisories/11539

Trust: 2.5

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/16051

Trust: 1.9

url:http://www.auscert.org.au/render.html?it=4070

Trust: 1.7

url:http://www.atstake.com/research/advisories/2004/a050304-1.txt

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.8

url:http://secunia.com/advisories/11539/

Trust: 0.8

url:http://www.securiteam.com/securitynews/5qp0115cuo.html

Trust: 0.8

url:http://www.securitytracker.com/alerts/2004/may/1010039.html2

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2004-0428

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/16051

Trust: 0.6

sources: CERT/CC: VU#648406 // VULHUB: VHN-8858 // JVNDB: JVNDB-2004-000936 // CNNVD: CNNVD-200405-007 // NVD: CVE-2004-0428

CREDITS

Aaron lumpy@musicvision.com

Trust: 0.6

sources: CNNVD: CNNVD-200405-007

SOURCES

db:CERT/CCid:VU#648406
db:VULHUBid:VHN-8858
db:BIDid:10270
db:JVNDBid:JVNDB-2004-000936
db:CNNVDid:CNNVD-200405-007
db:NVDid:CVE-2004-0428

LAST UPDATE DATE

2024-08-14T12:48:28.337000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#648406date:2004-05-07T00:00:00
db:VULHUBid:VHN-8858date:2017-07-11T00:00:00
db:BIDid:10270date:2009-07-12T04:07:00
db:JVNDBid:JVNDB-2004-000936date:2024-06-07T09:00:00
db:CNNVDid:CNNVD-200405-007date:2005-10-20T00:00:00
db:NVDid:CVE-2004-0428date:2017-07-11T01:30:09.353

SOURCES RELEASE DATE

db:CERT/CCid:VU#648406date:2004-05-07T00:00:00
db:VULHUBid:VHN-8858date:2004-05-03T00:00:00
db:BIDid:10270date:2004-05-03T00:00:00
db:JVNDBid:JVNDB-2004-000936date:2024-06-07T00:00:00
db:CNNVDid:CNNVD-200405-007date:2004-05-03T00:00:00
db:NVDid:CVE-2004-0428date:2004-05-03T04:00:00