ID

VAR-200510-0131


CVE

CVE-2005-2748


TITLE

Apple Mac OS X MallocStackLogging Local Arbitrary File Modification Vulnerability

Trust: 0.9

sources: BID: 14939 // CNNVD: CNNVD-200510-208

DESCRIPTION

The malloc function in the libSystem library in Apple Mac OS X 10.3.9 and 10.4.2 allows local users to overwrite arbitrary files by setting the MallocLogFile environment variable to the target file before running a setuid application. Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code. Apple Mac OS X QuickDraw Manager contains a buffer overflow that may allow a remote attacker to execute arbitrary code. Two vulnerabilities in Mail resulting in information disclosure. A local privilege escalation vulnerability in malloc. This issue has been split into BID 14939. An arbitrary code execution vulnerability in QuickDraw Manager. A privilege escalation vulnerability in QuickTime for Java. A cross-site scripting vulnerability in Safari. An unauthorized access vulnerability in SecurityAgent. A privilege escalation vulnerability in securityd. This issue is due to insecure file handling in the 'malloc()' library for setuid applications. This issue occurs due to insufficient checks in the memory allocation library, leading to local users being able to utilize the debugging features on setuid applications. A local attacker could exploit this vulnerability to create, or append data to arbitrary files with superuser privileges. Depending on the purpose of the modified files, this may cause system crashes, or allow attackers to gain elevated privileges. 1) A boundary error in ImageIO can be exploited to cause a buffer overflow and may allow execution of arbitrary code on a user's system when a specially crafted GIF file is opened e.g. in WebCore or Safari. 2) An error in Mail.app when processing auto-reply rules can cause an automatically generated response message to include a plain-text copy of the encrypted message. This may disclose certain sensitive information. 3) An error in Mail.app when using Kerberos 5 for SMTP authentication can cause un-initialized memory to be appended to a message. This may disclose certain sensitive information. For more information: SA16449 4) "malloc" creates diagnostic files insecurely when certain environmental variables are set to enable debugging of application memory allocation. from Safari, Mail, or Finder. 6) A validation error in the Java extensions bundled with QuickTime 6.52 and earlier can be exploited by untrusted applets to call arbitrary functions from system libraries. For more information: SA15767 8) A validation error in Safari when rendering web archives from a malicious site can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of another site. For more information: SA16449 9) An error in the SecurityAgent may cause the "Switch User..." button to be displayed even when the "Enable fast user switching" setting has been disabled. This may allow malicious, local users to access the current user's desktop without authentication even when the "Require password to wake this computer from sleep or screen saver" setting is enabled. 10) A validation error in the Authorization Services "securityd" allows unprivileged users to gain certain privileges that should be restricted to administrative users. This can be exploited by malicious, local users to gain escalated privileges. SOLUTION: Apply Security Update 2005-008. Mac OS X 10.3.9: http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html Mac OS X 10.4.2: http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html PROVIDED AND/OR DISCOVERED BY: 2) Norbert Rittel, Rittel Consulting 3) MIT Kerberos Team 4) Ilja van Sprundel, Suresec LTD 5) Henrik Dalgaard, Echo One 6) Dino Dai Zovi 9) Luke Fowler, Indiana University Global Research Network Operations Center ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=302413 OTHER REFERENCES: SA15767: http://secunia.com/advisories/15767/ SA16449: http://secunia.com/advisories/16449/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The vulnerability is caused due to an unspecified error in the XMLRPC module, which may be exploited to execute arbitrary commands on a vulnerable XMLRPC server. The vulnerability has been reported in version 1.8.2. Prior versions may also be affected. SOLUTION: The vulnerability has been fixed in the CVS repository

Trust: 3.96

sources: NVD: CVE-2005-2748 // CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // BID: 14914 // BID: 14939 // VULHUB: VHN-13957 // PACKETSTORM: 38643 // PACKETSTORM: 40227 // PACKETSTORM: 38222

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.9

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.9

Trust: 1.6

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:rubymodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.6

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // BID: 14914 // BID: 14939 // CNNVD: CNNVD-200510-208 // NVD: CVE-2005-2748

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2748
value: LOW

Trust: 1.0

CARNEGIE MELLON: VU#684913
value: 9.11

Trust: 0.8

CARNEGIE MELLON: VU#529945
value: 28.69

Trust: 0.8

CARNEGIE MELLON: VU#650681
value: 24.53

Trust: 0.8

CNNVD: CNNVD-200510-208
value: LOW

Trust: 0.6

VULHUB: VHN-13957
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2005-2748
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13957
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // VULHUB: VHN-13957 // CNNVD: CNNVD-200510-208 // NVD: CVE-2005-2748

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2748

THREAT TYPE

local

Trust: 0.9

sources: BID: 14939 // CNNVD: CNNVD-200510-208

TYPE

Design Error

Trust: 0.9

sources: BID: 14939 // CNNVD: CNNVD-200510-208

EXTERNAL IDS

db:AUSCERTid:ESB-2005.0732

Trust: 4.1

db:SECUNIAid:16920

Trust: 3.4

db:NVDid:CVE-2005-2748

Trust: 2.4

db:BIDid:14914

Trust: 1.9

db:SECUNIAid:15767

Trust: 0.9

db:AUSCERTid:ESB-2005.0611

Trust: 0.8

db:BIDid:14016

Trust: 0.8

db:CERT/CCid:VU#684913

Trust: 0.8

db:XFid:22384

Trust: 0.8

db:SECTRACKid:1014961

Trust: 0.8

db:CERT/CCid:VU#529945

Trust: 0.8

db:SECTRACKid:1014958

Trust: 0.8

db:XFid:22381

Trust: 0.8

db:CERT/CCid:VU#650681

Trust: 0.8

db:CNNVDid:CNNVD-200510-208

Trust: 0.7

db:APPLEid:APPLE-SA-2005-09-22

Trust: 0.6

db:US GOVERNMENTid:P-312

Trust: 0.6

db:BIDid:14939

Trust: 0.4

db:PACKETSTORMid:40249

Trust: 0.2

db:VULHUBid:VHN-13957

Trust: 0.1

db:SECUNIAid:16045

Trust: 0.1

db:PACKETSTORMid:38643

Trust: 0.1

db:PACKETSTORMid:40227

Trust: 0.1

db:PACKETSTORMid:38222

Trust: 0.1

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // VULHUB: VHN-13957 // BID: 14914 // BID: 14939 // PACKETSTORM: 38643 // PACKETSTORM: 40249 // PACKETSTORM: 40227 // PACKETSTORM: 38222 // CNNVD: CNNVD-200510-208 // NVD: CVE-2005-2748

REFERENCES

url:http://www.auscert.org.au/5509

Trust: 4.1

url:http://secunia.com/advisories/16920/

Trust: 3.4

url:http://www.suresec.org/advisories/adv7.pdf

Trust: 2.0

url:http://docs.info.apple.com/article.html?artnum=302413

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2005/sep/msg00002.html

Trust: 1.7

url:http://www.ciac.org/ciac/bulletins/p-312.shtml

Trust: 1.7

url:http://www.securityfocus.com/bid/14914

Trust: 1.6

url:http://www.info.apple.com/usen/security/security_updates.html

Trust: 1.2

url:http://secunia.com/advisories/15767/

Trust: 1.1

url:http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-core/5237

Trust: 0.8

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315064

Trust: 0.8

url:http://www.securityfocus.com/bid/14016

Trust: 0.8

url:https://rhn.redhat.com/errata/rhsa-2005-543.html

Trust: 0.8

url:http://www.auscert.org.au/5356

Trust: 0.8

url:http://developer.apple.com/documentation/carbon/reference/quickdraw_ref/index.html

Trust: 0.8

url:http://developer.apple.com/documentation/mac/quickdraw/quickdraw-333.html#heading333-29

Trust: 0.8

url:http://securitytracker.com/alerts/2005/sep/1014961.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/22384

Trust: 0.8

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33420

Trust: 0.8

url:http://securitytracker.com/alerts/2005/sep/1014958.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/22381

Trust: 0.8

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33423

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://www.apple.com

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/secunia_vacancies/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:http://secunia.com/advisories/16045/

Trust: 0.1

url:http://www.mandriva.com/security/advisories?name=mdksa-2005:118

Trust: 0.1

url:http://secunia.com/product/4198/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2748

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html

Trust: 0.1

url:http://secunia.com/advisories/16449/

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html

Trust: 0.1

url:http://secunia.com/product/3787/

Trust: 0.1

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // VULHUB: VHN-13957 // BID: 14914 // BID: 14939 // PACKETSTORM: 38643 // PACKETSTORM: 40249 // PACKETSTORM: 40227 // PACKETSTORM: 38222 // CNNVD: CNNVD-200510-208 // NVD: CVE-2005-2748

CREDITS

This issue was discovered by Ilja van Sprundel.

Trust: 0.9

sources: BID: 14939 // CNNVD: CNNVD-200510-208

SOURCES

db:CERT/CCid:VU#684913
db:CERT/CCid:VU#529945
db:CERT/CCid:VU#650681
db:VULHUBid:VHN-13957
db:BIDid:14914
db:BIDid:14939
db:PACKETSTORMid:38643
db:PACKETSTORMid:40249
db:PACKETSTORMid:40227
db:PACKETSTORMid:38222
db:CNNVDid:CNNVD-200510-208
db:NVDid:CVE-2005-2748

LAST UPDATE DATE

2024-08-14T12:52:03.141000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#684913date:2005-10-18T00:00:00
db:CERT/CCid:VU#529945date:2005-09-27T00:00:00
db:CERT/CCid:VU#650681date:2005-09-27T00:00:00
db:VULHUBid:VHN-13957date:2008-09-05T00:00:00
db:BIDid:14914date:2009-07-12T17:06:00
db:BIDid:14939date:2009-07-12T17:06:00
db:CNNVDid:CNNVD-200510-208date:2005-10-28T00:00:00
db:NVDid:CVE-2005-2748date:2008-09-05T20:52:35.860

SOURCES RELEASE DATE

db:CERT/CCid:VU#684913date:2005-10-03T00:00:00
db:CERT/CCid:VU#529945date:2005-09-27T00:00:00
db:CERT/CCid:VU#650681date:2005-09-27T00:00:00
db:VULHUBid:VHN-13957date:2005-10-25T00:00:00
db:BIDid:14914date:2005-09-22T00:00:00
db:BIDid:14939date:2005-09-22T00:00:00
db:PACKETSTORMid:38643date:2005-07-14T05:31:13
db:PACKETSTORMid:40249date:2005-09-26T05:12:10
db:PACKETSTORMid:40227date:2005-09-23T15:06:34
db:PACKETSTORMid:38222date:2005-06-23T07:00:38
db:CNNVDid:CNNVD-200510-208date:2005-10-25T00:00:00
db:NVDid:CVE-2005-2748date:2005-10-25T22:06:00