ID

VAR-200408-0089


CVE

CVE-2004-0538


TITLE

Apple Mac OS X Multiple Security Vulnerabilities

Trust: 0.9

sources: BID: 10486 // CNNVD: CNNVD-200408-060

DESCRIPTION

LaunchServices in Mac OS X 10.3.4 and 10.2.8 automatically registers and executes new applications, which could allow attackers to execute arbitrary code without warning the user. apple's Apple Mac OS X and Apple Mac OS X Server Exists in unspecified vulnerabilities.None. A security update has been released to address these issues and provide other enhancements. The following issues were reported: LaunchServices is reported prone to a vulnerability where the LaunchServices utility automatically registers applications. It is reported that an attacker may exploit this issue to register and run malicious applications. DiskImageMounter is reported prone to a vulnerability where the disk:// URI handler may be used to mount an anonymous remote file system. This attack can be achieved using the HTTP protocol. A remote attacker may exploit this vulnerability to write to the local disk. Safari is reported prone to an unspecified vulnerability where the Safari "Show in Finder" button, when invoked, would attempt to execute certain files instead of revealing the files in the finder window. An attacker may potentially exploit this condition to automatically execute files on the file system (including downloaded files). This could lead to privilege escalation or remote compromise. Some of these issues may already be described in previous BIDs. This BID will be split up into unique BIDs when further analysis of this update is complete. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2004-06-07 Security Update 2004-06-07 Description Security Update 2004-06-07 delivers a number of security enhancements and is recommended for all Macintosh users. The purpose of this update is to increase security by alerting you when opening an application for the first time via document mappings or a web address (URL). Discussion: LaunchServices is a system component that discovers and opens applications. This system component has been modified to only open applications that have previously been explicitly run on the system. Attempts to run an application that has not previously been explicitly run will result in a user alert. Further information is available in http://docs.info.apple.com/article.html?artnum=25785 Component: DiskImageMounter CVE-ID: No CVE ID has been reserved as this is only an additional preventative measure. Component: Terminal CVE-ID: Not applicable Impact: Attempts to use a telnet:// URI with an alternate port number fail. Discussion: A modification has been made to allow the specification of an alternate port number in a telnet:// URI. This restores functionality that was removed with the recent fix for CAN-2004-0485. ================================================ Security Update 2004-06-07 may be obtained from: * Software Update pane in System Preferences * Apple's Software Downloads web site: For Mac OS X v10.3.4 "Panther" and Mac OS X Server v10.3.4 ========================================================== http://www.apple.com/support/downloads/ Click on: Security Update 2004-06-07 (10.3.4) The download file is named: "SecUpd2004-06-07Pan.dmg" Its SHA-1 digest is: 182745485d8db3ea29ec67cb603cc5668a4f60d9 For Mac OS X v10.2.8 "Jaguar" and Mac OS X Server v10.2.8 ========================================================= http://www.apple.com/support/downloads/ Click on: Security Update 2004-06-07 (10.2.8) The download file is named: "SecUpd2004-06-07Jag.dmg" Its SHA-1 digest is: e5fa73f6a67bdcd9af76927d3416974f039b2087 Information will also be posted to the Apple Product Security web site: http://www.apple.com/support/security/security_updates.html This message is signed with Apple's Product Security PGP key, and details are available at: http://www.apple.com/support/security/security_pgp.html -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.2 iQEVAwUBQMTXipyw5owIz4TQAQJabgf/XdzbpuwKuBbVYQAVUl8mZd+Bs7QVdF2x sVJiNlgjyObJjTd5sjqCP9695enrEhClliNM+qOtoUcj0ed4gKIWtOBDzPuuYSb8 xjgb0ntbOg8VOoI5FX5o8dWRAmJu7SXDbnKNvpTgPfFl0Gb2spgGsX5aINGLD8iS h5SerdpJYDEMvXyAl/7Mnfz0TYH8ThWStRiEkEeaucD6Uc1yBDhUl3uV/jjHjvcp AFbaI14R/UNEypI4z0ylpH0a5tLG4CKOTAOwt68Kcs3Undbqbp8FvIUqD2Iy6fXF EtdF329mjgcaa7iDYnt2BXPvkRvthla+98flmjD9okzhM69x2t0Ubg== =JdW9 -----END PGP SIGNATURE----- _______________________________________________ security-announce mailing list | security-announce@lists.apple.com Help/Unsubscribe/Archives: http://www.lists.apple.com/mailman/listinfo/security-announce Do not post admin requests to the list. They will be ignored

Trust: 2.07

sources: NVD: CVE-2004-0538 // JVNDB: JVNDB-2004-000922 // BID: 10486 // VULHUB: VHN-8968 // PACKETSTORM: 33508

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.3.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.8

Trust: 1.6

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.2.8

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.3.4

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.3.4

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:10.2.8

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server 10.2.8

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:10.3.4

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

sources: BID: 10486 // JVNDB: JVNDB-2004-000922 // CNNVD: CNNVD-200408-060 // NVD: CVE-2004-0538

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-0538
value: HIGH

Trust: 1.0

NVD: CVE-2004-0538
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200408-060
value: HIGH

Trust: 0.6

VULHUB: VHN-8968
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2004-0538
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-8968
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-8968 // JVNDB: JVNDB-2004-000922 // CNNVD: CNNVD-200408-060 // NVD: CVE-2004-0538

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2004-000922 // NVD: CVE-2004-0538

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200408-060

TYPE

Unknown

Trust: 0.9

sources: BID: 10486 // CNNVD: CNNVD-200408-060

PATCH

title:top pageurl:https://www.apple.com/

Trust: 0.8

sources: JVNDB: JVNDB-2004-000922

EXTERNAL IDS

db:NVDid:CVE-2004-0538

Trust: 3.7

db:JVNDBid:JVNDB-2004-000922

Trust: 0.8

db:CNNVDid:CNNVD-200408-060

Trust: 0.7

db:BIDid:10486

Trust: 0.3

db:PACKETSTORMid:33508

Trust: 0.2

db:VULHUBid:VHN-8968

Trust: 0.1

sources: VULHUB: VHN-8968 // BID: 10486 // JVNDB: JVNDB-2004-000922 // PACKETSTORM: 33508 // CNNVD: CNNVD-200408-060 // NVD: CVE-2004-0538

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=25785

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2004-0538

Trust: 0.9

url:http://www.info.apple.com/usen/security/security_updates.html

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.apple.com/support/security/security_updates.html

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:http://www.apple.com/support/security/security_pgp.html

Trust: 0.1

url:http://www.lists.apple.com/mailman/listinfo/security-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2004-0539

Trust: 0.1

sources: VULHUB: VHN-8968 // BID: 10486 // JVNDB: JVNDB-2004-000922 // PACKETSTORM: 33508 // NVD: CVE-2004-0538

CREDITS

The vendor disclosed these vulnerabilities.

Trust: 0.9

sources: BID: 10486 // CNNVD: CNNVD-200408-060

SOURCES

db:VULHUBid:VHN-8968
db:BIDid:10486
db:JVNDBid:JVNDB-2004-000922
db:PACKETSTORMid:33508
db:CNNVDid:CNNVD-200408-060
db:NVDid:CVE-2004-0538

LAST UPDATE DATE

2024-08-14T14:29:28.199000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-8968date:2017-10-12T00:00:00
db:BIDid:10486date:2009-07-12T05:16:00
db:JVNDBid:JVNDB-2004-000922date:2024-06-07T08:54:00
db:CNNVDid:CNNVD-200408-060date:2005-10-20T00:00:00
db:NVDid:CVE-2004-0538date:2017-10-12T01:29:00.383

SOURCES RELEASE DATE

db:VULHUBid:VHN-8968date:2004-08-06T00:00:00
db:BIDid:10486date:2004-06-07T00:00:00
db:JVNDBid:JVNDB-2004-000922date:2024-06-07T00:00:00
db:PACKETSTORMid:33508date:2004-06-09T05:58:22
db:CNNVDid:CNNVD-200408-060date:2004-08-06T00:00:00
db:NVDid:CVE-2004-0538date:2004-08-06T04:00:00