ID

VAR-200510-0137


CVE

CVE-2005-2742


TITLE

Ruby library contains vulnerable default value

Trust: 0.8

sources: CERT/CC: VU#684913

DESCRIPTION

SecurityAgent in Apple Mac OS X 10.4.2, under certain circumstances, can cause the "Switch User..." button to appear even though the "Enable fast user switching" setting is disabled, which can allow attackers with physical access to gain access to the desktop and bypass the "Require password to wake this computer from sleep or screen saver" setting. Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code. Apple Mac OS X QuickDraw Manager contains a buffer overflow that may allow a remote attacker to execute arbitrary code. Two vulnerabilities in Mail resulting in information disclosure. A local privilege escalation vulnerability in malloc. This issue has been split into BID 14939. An arbitrary code execution vulnerability in QuickDraw Manager. A privilege escalation vulnerability in QuickTime for Java. A cross-site scripting vulnerability in Safari. An unauthorized access vulnerability in SecurityAgent. A privilege escalation vulnerability in securityd. Security Agent is a powerful system security auxiliary tool in the Apple system. 1) A boundary error in ImageIO can be exploited to cause a buffer overflow and may allow execution of arbitrary code on a user's system when a specially crafted GIF file is opened e.g. in WebCore or Safari. 2) An error in Mail.app when processing auto-reply rules can cause an automatically generated response message to include a plain-text copy of the encrypted message. This may disclose certain sensitive information. 3) An error in Mail.app when using Kerberos 5 for SMTP authentication can cause un-initialized memory to be appended to a message. This may disclose certain sensitive information. For more information: SA16449 4) "malloc" creates diagnostic files insecurely when certain environmental variables are set to enable debugging of application memory allocation. This can be exploited by malicious, local users to create or overwrite arbitrary files. from Safari, Mail, or Finder. 6) A validation error in the Java extensions bundled with QuickTime 6.52 and earlier can be exploited by untrusted applets to call arbitrary functions from system libraries. Systems with QuickTime 7 or later, or Mac OS X v10.4 or later, are not affected. Systems prior to Mac OS X v10.4 are not affected. For more information: SA15767 8) A validation error in Safari when rendering web archives from a malicious site can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of another site. 10) A validation error in the Authorization Services "securityd" allows unprivileged users to gain certain privileges that should be restricted to administrative users. This can be exploited by malicious, local users to gain escalated privileges. SOLUTION: Apply Security Update 2005-008. Mac OS X 10.3.9: http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html Mac OS X 10.4.2: http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html PROVIDED AND/OR DISCOVERED BY: 2) Norbert Rittel, Rittel Consulting 3) MIT Kerberos Team 4) Ilja van Sprundel, Suresec LTD 5) Henrik Dalgaard, Echo One 6) Dino Dai Zovi 9) Luke Fowler, Indiana University Global Research Network Operations Center ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=302413 OTHER REFERENCES: SA15767: http://secunia.com/advisories/15767/ SA16449: http://secunia.com/advisories/16449/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The vulnerability is caused due to an unspecified error in the XMLRPC module, which may be exploited to execute arbitrary commands on a vulnerable XMLRPC server. The vulnerability has been reported in version 1.8.2. Prior versions may also be affected. SOLUTION: The vulnerability has been fixed in the CVS repository

Trust: 3.69

sources: NVD: CVE-2005-2742 // CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // BID: 14914 // VULHUB: VHN-13951 // PACKETSTORM: 38643 // PACKETSTORM: 40227 // PACKETSTORM: 38222

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.6

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:rubymodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // BID: 14914 // CNNVD: CNNVD-200510-211 // NVD: CVE-2005-2742

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2742
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#684913
value: 9.11

Trust: 0.8

CARNEGIE MELLON: VU#529945
value: 28.69

Trust: 0.8

CARNEGIE MELLON: VU#650681
value: 24.53

Trust: 0.8

CNNVD: CNNVD-200510-211
value: MEDIUM

Trust: 0.6

VULHUB: VHN-13951
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-2742
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13951
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // VULHUB: VHN-13951 // CNNVD: CNNVD-200510-211 // NVD: CVE-2005-2742

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2742

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200510-211

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200510-211

EXTERNAL IDS

db:AUSCERTid:ESB-2005.0732

Trust: 4.1

db:SECUNIAid:16920

Trust: 3.4

db:NVDid:CVE-2005-2742

Trust: 2.0

db:BIDid:14914

Trust: 1.9

db:SECUNIAid:15767

Trust: 0.9

db:AUSCERTid:ESB-2005.0611

Trust: 0.8

db:BIDid:14016

Trust: 0.8

db:CERT/CCid:VU#684913

Trust: 0.8

db:XFid:22384

Trust: 0.8

db:SECTRACKid:1014961

Trust: 0.8

db:CERT/CCid:VU#529945

Trust: 0.8

db:SECTRACKid:1014958

Trust: 0.8

db:XFid:22381

Trust: 0.8

db:CERT/CCid:VU#650681

Trust: 0.8

db:CNNVDid:CNNVD-200510-211

Trust: 0.7

db:APPLEid:APPLE-SA-2005-09-22

Trust: 0.6

db:US GOVERNMENTid:P-312

Trust: 0.6

db:VULHUBid:VHN-13951

Trust: 0.1

db:SECUNIAid:16045

Trust: 0.1

db:PACKETSTORMid:38643

Trust: 0.1

db:PACKETSTORMid:40227

Trust: 0.1

db:PACKETSTORMid:38222

Trust: 0.1

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // VULHUB: VHN-13951 // BID: 14914 // PACKETSTORM: 38643 // PACKETSTORM: 40227 // PACKETSTORM: 38222 // CNNVD: CNNVD-200510-211 // NVD: CVE-2005-2742

REFERENCES

url:http://www.auscert.org.au/5509

Trust: 4.1

url:http://secunia.com/advisories/16920/

Trust: 3.4

url:http://docs.info.apple.com/article.html?artnum=302413

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2005/sep/msg00002.html

Trust: 1.7

url:http://www.ciac.org/ciac/bulletins/p-312.shtml

Trust: 1.7

url:http://www.securityfocus.com/bid/14914

Trust: 1.6

url:http://secunia.com/advisories/15767/

Trust: 1.1

url:http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-core/5237

Trust: 0.8

url:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315064

Trust: 0.8

url:http://www.securityfocus.com/bid/14016

Trust: 0.8

url:https://rhn.redhat.com/errata/rhsa-2005-543.html

Trust: 0.8

url:http://www.auscert.org.au/5356

Trust: 0.8

url:http://developer.apple.com/documentation/carbon/reference/quickdraw_ref/index.html

Trust: 0.8

url:http://developer.apple.com/documentation/mac/quickdraw/quickdraw-333.html#heading333-29

Trust: 0.8

url:http://securitytracker.com/alerts/2005/sep/1014961.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/22384

Trust: 0.8

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33420

Trust: 0.8

url:http://securitytracker.com/alerts/2005/sep/1014958.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/22381

Trust: 0.8

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33423

Trust: 0.8

url:http://www.info.apple.com/usen/security/security_updates.html

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.apple.com

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/secunia_vacancies/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:http://secunia.com/advisories/16045/

Trust: 0.1

url:http://www.mandriva.com/security/advisories?name=mdksa-2005:118

Trust: 0.1

url:http://secunia.com/product/4198/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html

Trust: 0.1

url:http://secunia.com/advisories/16449/

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html

Trust: 0.1

url:http://secunia.com/product/3787/

Trust: 0.1

sources: CERT/CC: VU#684913 // CERT/CC: VU#529945 // CERT/CC: VU#650681 // VULHUB: VHN-13951 // BID: 14914 // PACKETSTORM: 38643 // PACKETSTORM: 40227 // PACKETSTORM: 38222 // CNNVD: CNNVD-200510-211 // NVD: CVE-2005-2742

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-200510-211

SOURCES

db:CERT/CCid:VU#684913
db:CERT/CCid:VU#529945
db:CERT/CCid:VU#650681
db:VULHUBid:VHN-13951
db:BIDid:14914
db:PACKETSTORMid:38643
db:PACKETSTORMid:40227
db:PACKETSTORMid:38222
db:CNNVDid:CNNVD-200510-211
db:NVDid:CVE-2005-2742

LAST UPDATE DATE

2024-08-14T12:47:42.043000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#684913date:2005-10-18T00:00:00
db:CERT/CCid:VU#529945date:2005-09-27T00:00:00
db:CERT/CCid:VU#650681date:2005-09-27T00:00:00
db:VULHUBid:VHN-13951date:2008-09-05T00:00:00
db:BIDid:14914date:2009-07-12T17:06:00
db:CNNVDid:CNNVD-200510-211date:2005-10-28T00:00:00
db:NVDid:CVE-2005-2742date:2008-09-05T20:52:34.907

SOURCES RELEASE DATE

db:CERT/CCid:VU#684913date:2005-10-03T00:00:00
db:CERT/CCid:VU#529945date:2005-09-27T00:00:00
db:CERT/CCid:VU#650681date:2005-09-27T00:00:00
db:VULHUBid:VHN-13951date:2005-10-26T00:00:00
db:BIDid:14914date:2005-09-22T00:00:00
db:PACKETSTORMid:38643date:2005-07-14T05:31:13
db:PACKETSTORMid:40227date:2005-09-23T15:06:34
db:PACKETSTORMid:38222date:2005-06-23T07:00:38
db:CNNVDid:CNNVD-200510-211date:2005-10-25T00:00:00
db:NVDid:CVE-2005-2742date:2005-10-26T00:02:00