ID

VAR-200505-0906


CVE

CVE-2005-0126


TITLE

Apple Mac OS X vulnerable to information disclosure in "Message-ID" header

Trust: 0.8

sources: CERT/CC: VU#464662

DESCRIPTION

ColorSync on Mac OS X 10.3.7 and 10.3.8 allows attackers to execute arbitrary code via malformed ICC color profiles that modify the heap. The Mail application supplied with Apple's Mac OS X operating system identifies the system from which any electronic mail is sent. A remote buffer overflow vulnerability affects the International Color Consortium (ICC) color profile processing functionality of Apple ColorSync. This issue is due to a failure of the application to properly validate user-supplied data prior to copying it into static process buffers. An attacker may leverage this issue to execute arbitrary code in the context of the ColorSync utility; it is currently unknown whether the ColorSync utility runs with superuser privileges, although it is likely

Trust: 3.42

sources: NVD: CVE-2005-0126 // CERT/CC: VU#464662 // CERT/CC: VU#678150 // CERT/CC: VU#980078 // BID: 12367 // VULHUB: VHN-11335

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 2.4

vendor:applemodel:mac os xscope:eqversion:10.3.7

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.2.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.8

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.2.8

Trust: 1.6

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

sources: CERT/CC: VU#464662 // CERT/CC: VU#678150 // CERT/CC: VU#980078 // BID: 12367 // CNNVD: CNNVD-200505-241 // NVD: CVE-2005-0126

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-0126
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#464662
value: 2.81

Trust: 0.8

CARNEGIE MELLON: VU#678150
value: 8.10

Trust: 0.8

CARNEGIE MELLON: VU#980078
value: 4.13

Trust: 0.8

CNNVD: CNNVD-200505-241
value: HIGH

Trust: 0.6

VULHUB: VHN-11335
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-0126
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-11335
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#464662 // CERT/CC: VU#678150 // CERT/CC: VU#980078 // VULHUB: VHN-11335 // CNNVD: CNNVD-200505-241 // NVD: CVE-2005-0126

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0126

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200505-241

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 12367 // CNNVD: CNNVD-200505-241

EXTERNAL IDS

db:CERT/CCid:VU#980078

Trust: 2.5

db:SECUNIAid:14005

Trust: 2.4

db:NVDid:CVE-2005-0126

Trust: 2.0

db:BIDid:12367

Trust: 2.0

db:SECTRACKid:1013000

Trust: 1.7

db:CERT/CCid:VU#464662

Trust: 0.8

db:CERT/CCid:VU#678150

Trust: 0.8

db:CNNVDid:CNNVD-200505-241

Trust: 0.7

db:XFid:19083

Trust: 0.6

db:APPLEid:APPLE-SA-2005-01-25

Trust: 0.6

db:VULHUBid:VHN-11335

Trust: 0.1

sources: CERT/CC: VU#464662 // CERT/CC: VU#678150 // CERT/CC: VU#980078 // VULHUB: VHN-11335 // BID: 12367 // CNNVD: CNNVD-200505-241 // NVD: CVE-2005-0126

REFERENCES

url:http://lists.apple.com/archives/security-announce/2005/jan/msg00001.html

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=300770

Trust: 2.4

url:http://secunia.com/advisories/14005/

Trust: 2.4

url:http://www.securityfocus.com/bid/12367

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/980078

Trust: 1.7

url:http://securitytracker.com/id?1013000

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/19083

Trust: 1.1

url:http://www.immunitysec.com/resources-advisories.shtml

Trust: 0.8

url:http://www.immunitysec.com/downloads/nukido.pdf

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/19083

Trust: 0.6

url:http://www.apple.com/macosx/features/colorsync/

Trust: 0.3

sources: CERT/CC: VU#464662 // CERT/CC: VU#678150 // CERT/CC: VU#980078 // VULHUB: VHN-11335 // BID: 12367 // CNNVD: CNNVD-200505-241 // NVD: CVE-2005-0126

CREDITS

The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

Trust: 0.9

sources: BID: 12367 // CNNVD: CNNVD-200505-241

SOURCES

db:CERT/CCid:VU#464662
db:CERT/CCid:VU#678150
db:CERT/CCid:VU#980078
db:VULHUBid:VHN-11335
db:BIDid:12367
db:CNNVDid:CNNVD-200505-241
db:NVDid:CVE-2005-0126

LAST UPDATE DATE

2024-08-14T12:44:02.390000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#464662date:2005-01-31T00:00:00
db:CERT/CCid:VU#678150date:2005-01-28T00:00:00
db:CERT/CCid:VU#980078date:2005-01-27T00:00:00
db:VULHUBid:VHN-11335date:2017-07-11T00:00:00
db:BIDid:12367date:2009-07-12T10:06:00
db:CNNVDid:CNNVD-200505-241date:2005-10-20T00:00:00
db:NVDid:CVE-2005-0126date:2017-07-11T01:32:06.327

SOURCES RELEASE DATE

db:CERT/CCid:VU#464662date:2005-01-31T00:00:00
db:CERT/CCid:VU#678150date:2005-01-27T00:00:00
db:CERT/CCid:VU#980078date:2005-01-27T00:00:00
db:VULHUBid:VHN-11335date:2005-05-02T00:00:00
db:BIDid:12367date:2005-01-26T00:00:00
db:CNNVDid:CNNVD-200505-241date:2005-05-02T00:00:00
db:NVDid:CVE-2005-0126date:2005-05-02T04:00:00