ID

VAR-200409-0015


CVE

CVE-2004-0823


TITLE

Apple QuickTime Streaming Server vulnerable to DoS

Trust: 0.8

sources: CERT/CC: VU#914870

DESCRIPTION

OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. There is a vulnerability in the Mac OS X CoreFoundation framework that could allow a local attacker to execute arbitrary code. OpenLDAP In using a specific authentication scheme userPassword There is a flaw that prevents password authentication if the password value is obtained because the value stored in is not processed as plain text.Password authentication may be avoided. In certain undisclosed cases, OpenLDAP is reported prone to an ambiguous-password-attribute weakness. If an attacker can retrieve a password hash as contained in the OpenLDAP database, they may then be able to directly authenticate to the LDAP database. The attacker may gain unauthorized access if they can sniff password hashes from the network or if they can retrieve the contents of the 'userPassword' attribute from a database backup or through weak permissions on the database. The OpenLDAP that is included with Apple Mac OS X, versions 10.3.4 and 10.3.5, is reported affected. Versions of OpenLDAP included in other operating systems may also be affected. There is a problem in OpenLDAP's verification of CRYPT passwords. Remote attackers can use this vulnerability to log in using other users' CRYPT values ​​as passwords. An attacker can log in with the target user's authority by using the CRYPT value of the target user's password. Apple reports that CRYPT passwords can be specified as a clear text password as userPassword. According to reports, some authentication mechanisms can use CRYPT values ​​as plaintext passwords. TITLE: Red Hat update for openldap / nss_ldap SECUNIA ADVISORY ID: SA17233 VERIFY ADVISORY: http://secunia.com/advisories/17233/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of sensitive information WHERE: >From remote OPERATING SYSTEM: RedHat Linux Advanced Workstation 2.1 for Itanium http://secunia.com/product/1326/ RedHat Enterprise Linux WS 4 http://secunia.com/product/4670/ RedHat Enterprise Linux WS 3 http://secunia.com/product/2536/ RedHat Enterprise Linux WS 2.1 http://secunia.com/product/1044/ RedHat Enterprise Linux ES 4 http://secunia.com/product/4668/ RedHat Enterprise Linux ES 3 http://secunia.com/product/2535/ RedHat Enterprise Linux ES 2.1 http://secunia.com/product/1306/ RedHat Enterprise Linux AS 4 http://secunia.com/product/4669/ RedHat Enterprise Linux AS 3 http://secunia.com/product/2534/ RedHat Enterprise Linux AS 2.1 http://secunia.com/product/48/ DESCRIPTION: Red Hat has issued updates for openldap / nss_ldap. This fixes two security issues and a vulnerability, which can be exploit by malicious people to gain knowledge of sensitive information or bypass certain security restrictions. For more information: SA15906 SA16518 SA12491 SOLUTION: Updated packages are available from Red Hat Network. http://rhn.redhat.com/ ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2005-767.html http://rhn.redhat.com/errata/RHSA-2005-751.html OTHER REFERENCES: SA15906: http://secunia.com/advisories/15906/ SA16518: http://secunia.com/advisories/16518/ SA12491: http://secunia.com/advisories/12491/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 4.23

sources: NVD: CVE-2004-0823 // CERT/CC: VU#914870 // CERT/CC: VU#545446 // CERT/CC: VU#704110 // JVNDB: JVNDB-2004-000366 // BID: 11137 // VULHUB: VHN-9253 // PACKETSTORM: 40749

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 2.4

vendor:applemodel:mac os xscope:eqversion:10.3.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.8

Trust: 1.6

vendor:openldapmodel:openldapscope:eqversion:2.1.19

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.18

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.17

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.16

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.15

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.14

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.13

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.12

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.11

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.10

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1.4

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.27

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.25

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.23

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.22

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.21

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.20

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.19

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.18

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.17

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.16

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.15

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.14

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.13

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.12

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.11

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.10

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.9

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.8

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.7

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.6

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.5

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.4

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.3

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.2

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0.1

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.0

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.13

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.12

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.11

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.10

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.9

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.8

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.7

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.6

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.5

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.4

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.3

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.2

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2.1

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.2

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.1.4

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.1.3

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.1.2

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.1.1

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.1

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.0.3

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.0.2

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.0.1

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:1.0

Trust: 1.3

vendor:openldapmodel:openldapscope:eqversion:2.1_.20

Trust: 1.0

vendor:openldapmodel:openldapscope:eqversion:2.0.11_9

Trust: 1.0

vendor:openldapmodel:openldapscope:eqversion:2.0.11_11

Trust: 1.0

vendor:openldapmodel:openldapscope:eqversion:2.0.11_11s

Trust: 1.0

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:openldapmodel:openldapscope:eqversion:2.1.20

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.11-9

Trust: 0.3

vendor:openldapmodel:-11sscope:eqversion:2.0.11

Trust: 0.3

vendor:openldapmodel:openldapscope:eqversion:2.0.11-11

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

sources: CERT/CC: VU#914870 // CERT/CC: VU#545446 // CERT/CC: VU#704110 // BID: 11137 // JVNDB: JVNDB-2004-000366 // CNNVD: CNNVD-200409-014 // NVD: CVE-2004-0823

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-0823
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#914870
value: 1.73

Trust: 0.8

CARNEGIE MELLON: VU#545446
value: 9.62

Trust: 0.8

CARNEGIE MELLON: VU#704110
value: 5.91

Trust: 0.8

NVD: CVE-2004-0823
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200409-014
value: HIGH

Trust: 0.6

VULHUB: VHN-9253
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2004-0823
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-9253
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#914870 // CERT/CC: VU#545446 // CERT/CC: VU#704110 // VULHUB: VHN-9253 // JVNDB: JVNDB-2004-000366 // CNNVD: CNNVD-200409-014 // NVD: CVE-2004-0823

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-0823

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200409-014

TYPE

Design Error

Trust: 0.9

sources: BID: 11137 // CNNVD: CNNVD-200409-014

CONFIGURATIONS

sources: JVNDB: JVNDB-2004-000366

PATCH

title:RHSA-2005:751url:https://rhn.redhat.com/errata/RHSA-2005-751.html

Trust: 0.8

title:RHSA-2005:751url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-751J.html

Trust: 0.8

sources: JVNDB: JVNDB-2004-000366

EXTERNAL IDS

db:SECUNIAid:12491

Trust: 4.1

db:NVDid:CVE-2004-0823

Trust: 2.8

db:BIDid:11137

Trust: 2.8

db:SECUNIAid:17233

Trust: 1.8

db:SECUNIAid:21520

Trust: 1.7

db:AUSCERTid:ESB-2004.0559

Trust: 1.7

db:SECTRACKid:1011174

Trust: 1.6

db:BIDid:11138

Trust: 0.8

db:SECTRACKid:1011176

Trust: 0.8

db:CERT/CCid:VU#914870

Trust: 0.8

db:CERT/CCid:VU#545446

Trust: 0.8

db:CERT/CCid:VU#704110

Trust: 0.8

db:JVNDBid:JVNDB-2004-000366

Trust: 0.8

db:CNNVDid:CNNVD-200409-014

Trust: 0.7

db:APPLEid:APPLE-SA-2004-09-07

Trust: 0.6

db:XFid:17300

Trust: 0.6

db:REDHATid:RHSA-2005:751

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:10703

Trust: 0.6

db:VULHUBid:VHN-9253

Trust: 0.1

db:PACKETSTORMid:40749

Trust: 0.1

sources: CERT/CC: VU#914870 // CERT/CC: VU#545446 // CERT/CC: VU#704110 // VULHUB: VHN-9253 // BID: 11137 // JVNDB: JVNDB-2004-000366 // PACKETSTORM: 40749 // CNNVD: CNNVD-200409-014 // NVD: CVE-2004-0823

REFERENCES

url:http://secunia.com/advisories/12491/

Trust: 4.2

url:http://www.securityfocus.com/bid/11137

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 2.4

url:http://support.avaya.com/elmodocs2/security/asa-2006-157.htm

Trust: 2.0

url:http://www.securityfocus.com/advisories/7148

Trust: 1.7

url:http://www.auscert.org.au/render.html?it=4363

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2005-751.html

Trust: 1.7

url:http://secunia.com/advisories/17233

Trust: 1.7

url:http://secunia.com/advisories/21520

Trust: 1.7

url:http://developer.apple.com/documentation/macosx/conceptual/systemoverview/systemarchitecture/chapter_3_section_7.html

Trust: 1.6

url:http://www.securitytracker.com/alerts/2004/sep/1011174.html

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10703

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/17300

Trust: 1.1

url:http://www.securitytracker.com/alerts/2004/sep/1011176.html

Trust: 0.8

url:http://www.securityfocus.com/bid/11138

Trust: 0.8

url:http://developer.apple.com/documentation/corefoundation/reference/cfpluginref/reference/introduction.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0823

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0823

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/17300

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:10703

Trust: 0.6

url:http://www.openldap.org/

Trust: 0.3

url:http://secunia.com/advisories/17233/

Trust: 0.1

url:http://secunia.com/product/2536/

Trust: 0.1

url:http://secunia.com/product/2535/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/48/

Trust: 0.1

url:http://secunia.com/advisories/15906/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/4669/

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2005-751.html

Trust: 0.1

url:http://secunia.com/advisories/16518/

Trust: 0.1

url:http://secunia.com/product/4668/

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2005-767.html

Trust: 0.1

url:http://rhn.redhat.com/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/1326/

Trust: 0.1

url:http://secunia.com/product/1306/

Trust: 0.1

url:http://secunia.com/product/4670/

Trust: 0.1

url:http://secunia.com/product/2534/

Trust: 0.1

url:http://secunia.com/product/1044/

Trust: 0.1

sources: CERT/CC: VU#914870 // CERT/CC: VU#545446 // CERT/CC: VU#704110 // VULHUB: VHN-9253 // BID: 11137 // JVNDB: JVNDB-2004-000366 // PACKETSTORM: 40749 // CNNVD: CNNVD-200409-014 // NVD: CVE-2004-0823

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-200409-014

SOURCES

db:CERT/CCid:VU#914870
db:CERT/CCid:VU#545446
db:CERT/CCid:VU#704110
db:VULHUBid:VHN-9253
db:BIDid:11137
db:JVNDBid:JVNDB-2004-000366
db:PACKETSTORMid:40749
db:CNNVDid:CNNVD-200409-014
db:NVDid:CVE-2004-0823

LAST UPDATE DATE

2024-08-14T12:19:51.775000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#914870date:2004-09-15T00:00:00
db:CERT/CCid:VU#545446date:2004-09-29T00:00:00
db:CERT/CCid:VU#704110date:2004-09-09T00:00:00
db:VULHUBid:VHN-9253date:2017-10-11T00:00:00
db:BIDid:11137date:2006-08-16T21:45:00
db:JVNDBid:JVNDB-2004-000366date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200409-014date:2005-10-20T00:00:00
db:NVDid:CVE-2004-0823date:2017-10-11T01:29:35.107

SOURCES RELEASE DATE

db:CERT/CCid:VU#914870date:2004-09-13T00:00:00
db:CERT/CCid:VU#545446date:2004-09-09T00:00:00
db:CERT/CCid:VU#704110date:2004-09-09T00:00:00
db:VULHUBid:VHN-9253date:2004-09-07T00:00:00
db:BIDid:11137date:2004-09-07T00:00:00
db:JVNDBid:JVNDB-2004-000366date:2007-04-01T00:00:00
db:PACKETSTORMid:40749date:2005-10-18T22:10:31
db:CNNVDid:CNNVD-200409-014date:2004-09-07T00:00:00
db:NVDid:CVE-2004-0823date:2004-09-07T04:00:00