ID

VAR-200501-0293


CVE

CVE-2004-0926


TITLE

Apple MacOS QuickTime Buffer overflow vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200501-284

DESCRIPTION

Heap-based buffer overflow in Apple QuickTime on Mac OS 10.2.8 through 10.3.5 may allow remote attackers to execute arbitrary code via a certain BMP image. Multiple security vulnerabilities are reported in Mac OS X. A security update is available to address these issues and to provide other enhancements. The following issues are reported: Apple AFP server is reported prone to a remote denial of service vulnerability. A weak permissions vulnerability is reported to affect the AFP server. This may result in a false sense of security for an administrator. A vulnerability is reported to exist in the NetInfoManager utility. It is reported that the utility will, under certain circumstances, report the status of certain accounts as disabled when they are not. A heap-based buffer overrun is reported to exist in the QuickTime utility. An attacker may exploit this vulnerability to execute arbitrary instructions in the context of the user that is running the vulnerable software. Finally, ServerAdmin is reported prone to a weak default configuration vulnerability. This may result in ServerAdmin traffic being intercepted and decrypted by a remote attacker. This vulnerability has been split into BID 11344. Some of these issues may already be described in previous BIDs. This BID will be split up into unique BIDs when further analysis of this update is complete

Trust: 1.26

sources: NVD: CVE-2004-0926 // BID: 11322 // VULHUB: VHN-9356

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.2.6

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.8

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.5

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.12

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.14

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.4_3

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.16

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.20

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.0.4_8

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.1

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.13

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.1

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.17

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.4_5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.5

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.4

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.18

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.2

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.6

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.10

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.7

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.21

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.2

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.4_2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.3

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.15

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.19

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.0.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.2

Trust: 1.0

vendor:easy productsmodel:cupsscope:eqversion:1.1.19_rc5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.8

Trust: 1.0

vendor:applemodel:quicktime playerscope:eqversion:6.5.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.5

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:eqversion:6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:quicktime playerscope:neversion:6.5.2

Trust: 0.3

sources: BID: 11322 // CNNVD: CNNVD-200501-284 // NVD: CVE-2004-0926

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-0926
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200501-284
value: CRITICAL

Trust: 0.6

VULHUB: VHN-9356
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2004-0926
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-9356
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-9356 // CNNVD: CNNVD-200501-284 // NVD: CVE-2004-0926

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-0926

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200501-284

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200501-284

EXTERNAL IDS

db:NVDid:CVE-2004-0926

Trust: 2.0

db:BIDid:11322

Trust: 2.0

db:CNNVDid:CNNVD-200501-284

Trust: 0.7

db:APPLEid:APPLE-SA-2004-10-27

Trust: 0.6

db:APPLEid:APPLE-SA-2004-09-30

Trust: 0.6

db:VULHUBid:VHN-9356

Trust: 0.1

sources: VULHUB: VHN-9356 // BID: 11322 // CNNVD: CNNVD-200501-284 // NVD: CVE-2004-0926

REFERENCES

url:http://lists.apple.com/archives/security-announce/2004/oct/msg00000.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2004/oct/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/11322

Trust: 1.7

sources: VULHUB: VHN-9356 // CNNVD: CNNVD-200501-284 // NVD: CVE-2004-0926

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-200501-284

SOURCES

db:VULHUBid:VHN-9356
db:BIDid:11322
db:CNNVDid:CNNVD-200501-284
db:NVDid:CVE-2004-0926

LAST UPDATE DATE

2024-08-14T12:48:41.907000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-9356date:2008-09-05T00:00:00
db:BIDid:11322date:2009-07-12T07:06:00
db:CNNVDid:CNNVD-200501-284date:2005-10-20T00:00:00
db:NVDid:CVE-2004-0926date:2008-09-05T20:39:48.843

SOURCES RELEASE DATE

db:VULHUBid:VHN-9356date:2005-01-27T00:00:00
db:BIDid:11322date:2004-10-04T00:00:00
db:CNNVDid:CNNVD-200501-284date:2004-10-04T00:00:00
db:NVDid:CVE-2004-0926date:2005-01-27T05:00:00