ID

VAR-200512-0212


CVE

CVE-2005-4217


TITLE

Apple MacOS X BOMArchiveHelper Directory traversal vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200512-290

DESCRIPTION

Perl in Apple Mac OS X Server 10.3.9 does not properly drop privileges when using the "$<" variable to set uid, which allows attackers to gain privileges. Apple Mac OS X's Perl is susceptible to an insecure privilege-dropping weakness. This issue is due to Perl's failure to correctly drop privileges. Presumably, the cause of this issue is a flaw in Perl's compilation options. This vulnerability may allow attackers that exploit latent vulnerabilities in Perl applications to gain elevated privileges, increasing the potential for damage. The exact impact of exploitation depends on the specific use and implementation of the privilege-dropping facilities in affected Perl applications. Mac OS X version 10.3.9 is reported vulnerable to this issue. Other versions may also be affected. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-053A Apple Mac OS X Safari Command Execution Vulnerability Original release date: February 22, 2006 Last revised: -- Source: US-CERT Systems Affected Apple Safari running on Mac OS X Overview A file type determination vulnerability in Apple Safari could allow a remote attacker to execute arbitrary commands on a vulnerable system. I. Details are available in the following Vulnerability Note: VU#999708 - Apple Safari may automatically execute arbitrary shell commands II. Impact A remote, unauthenticated attacker could execute arbitrary commands with the privileges of the user running Safari. If the user is logged on with administrative privileges, the attacker could take complete control of an affected system. III. Solution Since there is no known patch for this issue at this time, US-CERT is recommending a workaround. References * US-CERT Vulnerability Note VU#999708 - <http://www.kb.cert.org/vuls/id/999708> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/#sgeneral> * Apple - Mac OS X - Safari RSS - <http://www.apple.com/macosx/features/safari/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-053A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-053A Feedback VU#999708" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History Feb 22, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQ/zKN30pj593lg50AQJgoQf/ZajorZz/6quzA40dc8cLxIBT70xcClH5 CKDN5nMXl1mRYYkDPF07GbcWL3lWarW5Hif0OiZfazaGNC3p9v4ZxDx/dW/ZmsYo eDznsNWNphKB6yBSIbOUSfGyh/I7pQlG3qxXRWDTA9nVK12KIkvAAoPTgBe40obu +x58gK5/ib4d+dEZ8F9SbO7/syYtcAzfzS2HrBYhG1lWWLYTaNC3hyI2nXF5lNV/ ymwaPv0ivAB9rpalus+KkajjiV5+J08dj+1JwgwcSpvuNMQ5c/8RCIILP+1bR+CL lScvGuSRYk4S0QI9nmCDvwD52sluiwp2VO1atTQ1zcgpwhvLRGo3DQ== =P2/3 -----END PGP SIGNATURE----- . Details of the fixes are available via the PHP web site (www.php.net). This could cause the systems to become unresponsive, or possibly allow arbitrary code delivered from the file servers to run on the target system. This framework is vulnerable to a directory traversal attack that can allow archived files to be unpacked into arbitrary locations that are writable by the current user. This update addresses the issue by properly sanitizing those paths. Credit to Stephane Kardas of CERTA for reporting this issue. This could lead to privilege elevation. This update addresses the issue by anticipating a hostile environment and by creating temporary files securely. Credit to Ilja van Sprundel of Suresec LTD, vade79, and iDefense (idefense.com) for reporting this issue. This update secures the method in which a FileVault image is created. This update addresses the issues by correctly handling the conditions that may cause crashes. Credit to OUSPG from the University of Oulu, NISCC, and CERT-FI for coordinating and reporting this issue. LibSystem CVE-ID: CVE-2005-3706 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Attackers may cause crashes or arbitrary code execution depending upon the application Description: An attacker able to cause an application to make requests for large amounts of memory may also be able to trigger a heap buffer overflow. This could cause the targeted application to crash or execute arbitrary code. This update addresses the issue by correctly handling these memory requests. Credit to Neil Archibald of Suresec LTD for reporting this issue. Mail CVE-ID: CVE-2006-0395 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Download Validation fails to warn about unsafe file types Description: In Mac OS X v10.4 Tiger, when an email attachment is double-clicked in Mail, Download Validation is used to warn the user if the file type is not "safe". Certain techniques can be used to disguise the file's type so that Download Validation is bypassed. This update addresses the issue by presenting Download Validation with the entire file, providing more information for Download Validation to detect unknown or unsafe file types in attachments. This may cause a program to continue to run with root privileges, assuming they have been dropped. This can cause security issues in third-party tools. This update addresses the issue by preventing such applications from continuing if the operation fails. Credit to Jason Self for reporting this issue. rsync CVE-ID: CVE-2005-3712 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Authenticated users may cause an rsync server to crash or execute arbitrary code Description: A heap-based buffer overflow may be triggered when the rsync server is used with the flag that allows extended attributes to be transferred. It may be possible for a malicious user with access to an rsync server to cause denial of service or code execution. This update addresses the problem by ensuring that the destination buffer is large enough to hold the extended attributes. Credit to Jan-Derk Bakker for reporting this issue. Safari CVE-ID: CVE-2005-4504 Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Viewing a maliciously-crafted web page may result in arbitrary code execution Description: A heap-based buffer overflow in WebKit's handling of certain HTML could allow a malicious web site to cause a crash or execute arbitrary code as the user viewing the site. This update addresses the issue by preventing the condition causing the overflow. Credit to Suresec LTD for reporting this issue. Safari CVE-ID: CVE-2006-0387 Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Viewing a malicious web page may cause arbitrary code execution Description: By preparing a web page including specially-crafted JavaScript, an attacker may trigger a stack buffer overflow that could lead to arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional bounds checking. Safari CVE-ID: CVE-2006-0388 Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Remote web sites can redirect to local resources, allowing JavaScript to execute in the local domain Description: Safari's security model prevents remote resources from causing redirection to local resources. An issue involving HTTP redirection can cause the browser to access a local file, bypassing certain restrictions. This update addresses the issue by preventing cross-domain HTTP redirects. When the "Open `safe' files after downloading" option is enabled in Safari's General preferences, visiting a malicious web site may result in the automatic download and execution of such a file. A proof-of-concept has been detected on public web sites that demonstrates the automatic execution of shell scripts. Syndication CVE-ID: CVE-2006-0389 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Subscriptions to malicious RSS content can lead to cross-site scripting Description: Syndication (Safari RSS) may allow JavaScript code embedded in feeds to run within the context of the RSS reader document, allowing malicious feeds to circumvent Safari's security model. This update addresses the issue by properly removing JavaScript code from feeds. The following security enhancements are also included in this update: FileVault: AES-128 encrypted FileVault disk images are now created with more restrictive operating system permissions. Credit to Eric Hall of DarkArt Consulting Services for reporting this issue. iChat: A malicious application named Leap.A that attempts to propagate using iChat has been detected. Users should use caution when opening files that are obtained from the network. Further information is available via: http://docs.info.apple.com/article.html?artnum=108009 Security Update 2006-001 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ For Mac OS X v10.4.5 (PowerPC) and Mac OS X Server v10.4.5 The download file is named: "SecUpd2006-001Ti.dmg" Its SHA-1 digest is: 999b73a54951b4e0a7f873fecf75f92840e8b439 For Mac OS X v10.4.5 (Intel) The download file is named: "SecUpd2006-001Intel.dmg" Its SHA-1 digest is: 473f94264876fa49fa15a8b6bb4bc30956502ad5 For Mac OS X v10.3.9 The download file is named: "SecUpd2006-001Pan.dmg" Its SHA-1 digest is: b6a000d451a1b1696726ff60142fc3da08042433 For Mac OS X Server v10.3.9 The download file is named: "SecUpdSrvr2006-001Pan.dmg" Its SHA-1 digest is: 2299380d72a61eadcbd0a5c6f46c924600ff5a9c Information will also be posted to the Apple Product Security web site: http://docs.info.apple.com/article.html?artnum=61798 This message is signed with Apple's Product Security PGP key, and details are available at: http://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.5 (Build 5050) iQEVAwUBRAYYVoHaV5ucd/HdAQJQWggApQmizj2t3+/87Fqun66/HCEkFt2YhUoe cmel0/KwJhWrk+LV+CYvixbDvKuGIjP8CWB9/s78YN93pOI5WcfyTKd07rEQYkT4 i8KPrM9QjdvgIjKd6O/VAOkzBc3DqV7KNVR2Hewa3jOigTm7Yxil9o/nZt1TLxAI 9TN0uduc13WHC8WE2N41I8MQ+VdGTX3ANZkfgR90lua4A2E1ab9kCN2qbg+E7Cus SkwsKp0qSH7bl8v0/R6c1hsYG0T1RwSWU6arAEliqzrrIbCm0Yxtgwp/CYFWC46j TQNCcppNgcr/pVPojACy8WFtQ3wEb6rJ4ZjH1C5nOem2EoCBh10WFw== =1Ww0 -----END PGP SIGNATURE-----

Trust: 1.44

sources: NVD: CVE-2005-4217 // BID: 15833 // VULHUB: VHN-15425 // PACKETSTORM: 44162 // PACKETSTORM: 44321

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.3.9

Trust: 1.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

sources: BID: 15833 // CNNVD: CNNVD-200512-290 // NVD: CVE-2005-4217

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-4217
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200512-290
value: HIGH

Trust: 0.6

VULHUB: VHN-15425
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-4217
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-15425
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-15425 // CNNVD: CNNVD-200512-290 // NVD: CVE-2005-4217

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.1

sources: VULHUB: VHN-15425 // NVD: CVE-2005-4217

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 44162 // CNNVD: CNNVD-200512-290

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200512-290

EXTERNAL IDS

db:NVDid:CVE-2005-4217

Trust: 2.1

db:BIDid:15833

Trust: 2.0

db:BIDid:16907

Trust: 1.7

db:SECUNIAid:17922

Trust: 1.7

db:SECUNIAid:19064

Trust: 1.7

db:OSVDBid:21800

Trust: 1.7

db:VUPENid:ADV-2005-2869

Trust: 1.7

db:VUPENid:ADV-2006-0791

Trust: 1.7

db:USCERTid:TA06-062A

Trust: 1.7

db:CNNVDid:CNNVD-200512-290

Trust: 0.7

db:CERT/CCid:TA06-062A

Trust: 0.6

db:XFid:23561

Trust: 0.6

db:APPLEid:APPLE-SA-2006-03-01

Trust: 0.6

db:VULHUBid:VHN-15425

Trust: 0.1

db:USCERTid:TA06-053A

Trust: 0.1

db:CERT/CCid:VU#999708

Trust: 0.1

db:PACKETSTORMid:44162

Trust: 0.1

db:PACKETSTORMid:44321

Trust: 0.1

sources: VULHUB: VHN-15425 // BID: 15833 // PACKETSTORM: 44162 // PACKETSTORM: 44321 // CNNVD: CNNVD-200512-290 // NVD: CVE-2005-4217

REFERENCES

url:http://lists.apple.com/archives/security-announce/2006/mar/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/15833

Trust: 1.7

url:http://www.securityfocus.com/bid/16907

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta06-062a.html

Trust: 1.7

url:http://docs.info.apple.com/article.html?artnum=303382

Trust: 1.7

url:http://www.osvdb.org/21800

Trust: 1.7

url:http://secunia.com/advisories/17922

Trust: 1.7

url:http://secunia.com/advisories/19064

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/2869

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/0791

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/23561

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/23561

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/0791

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2005/2869

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/999708>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-053a.html>

Trust: 0.1

url:http://www.apple.com/macosx/features/safari/>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/#sgeneral>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2713

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0387

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-4504

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2714

Trust: 0.1

url:http://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0394

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0395

Trust: 0.1

url:https://www.php.net).

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-4217

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3319

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0383

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0384

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0388

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=108009

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3706

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3392

Trust: 0.1

sources: VULHUB: VHN-15425 // BID: 15833 // PACKETSTORM: 44162 // PACKETSTORM: 44321 // CNNVD: CNNVD-200512-290 // NVD: CVE-2005-4217

CREDITS

Stéphane Kardas

Trust: 0.6

sources: CNNVD: CNNVD-200512-290

SOURCES

db:VULHUBid:VHN-15425
db:BIDid:15833
db:PACKETSTORMid:44162
db:PACKETSTORMid:44321
db:CNNVDid:CNNVD-200512-290
db:NVDid:CVE-2005-4217

LAST UPDATE DATE

2024-09-19T20:11:37.791000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-15425date:2017-07-20T00:00:00
db:BIDid:15833date:2006-03-06T20:16:00
db:CNNVDid:CNNVD-200512-290date:2006-06-09T00:00:00
db:NVDid:CVE-2005-4217date:2017-07-20T01:29:12.267

SOURCES RELEASE DATE

db:VULHUBid:VHN-15425date:2005-12-14T00:00:00
db:BIDid:15833date:2005-12-13T00:00:00
db:PACKETSTORMid:44162date:2006-02-26T03:08:24
db:PACKETSTORMid:44321date:2006-03-03T08:09:05
db:CNNVDid:CNNVD-200512-290date:2005-11-14T00:00:00
db:NVDid:CVE-2005-4217date:2005-12-14T11:03:00