ID

VAR-200512-0633


CVE

CVE-2005-2713


TITLE

Apple MacOS X BOMArchiveHelper Directory traversal vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200512-801

DESCRIPTION

passwd in Directory Services in Mac OS X 10.3.x before 10.3.9 and 10.4.x before 10.4.5 allows local users to create arbitrary world-writable files as root by specifying an alternate file in the password database option. Apple has also released updates to address these issues. Apple Mac OS X 'passwd' creates temporary files in an insecure manner. This could allow a local attacker to elevate their privileges. These issues were originally described in BID 16907 Apple Mac OS X Security Update 2006-001 Multiple Vulnerabilities. More information is available at the following link: http://www.apple.com/macosx/ II. The /usr/bin/passwd binary is a setuid application which allows users to change their password. There are two related vulnerabilities. The passwd binary does not check that the user has permissions to create a file in the location specified and does not set the created file permissions. By setting the file creation mask to 0 a user can create arbitrary files owned by root, with permissions which allow any user to change the contents. The second vulnerability exists in the insecure creation of temporary files with predictable names. The temporary filename created by the process is in the form /tmp/.pwtmp.<pid> where <pid> is the process id of the passwd process. By creating a symbolic link to the target file, and then changing the password, it is possible to put controllable contents into the target file. III. In the case of the first vulnerability, a new file could be created in the /etc directory, such as etc/rc.local_tuning, which is sourced if it exists during the system start up process as the root user. The second vulnerability would allow an attacker overwrite a file with user controlled contents. This can be leveraged to provide privilege escalation by, for example, creating a new /etc/sudoers file. IV. V. WORKAROUND Remove the setuid bit from the /usr/bin/passwd binary by executing the following command as root: chmod -s /usr/bin/passwd This workaround will prevent non-root users from being able to change their password. VI. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues: CVE-2005-2713 - passwd file creation and permissions CVE-2005-2714 - temporary file symlink problem VIII. DISCLOSURE TIMELINE 08/23/2005 Initial vendor notification 08/27/2005 Initial vendor response 03/02/2006 Coordinated public disclosure IX. CREDIT Discovery of these vulnerabilities are credited to vade79. Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp Free tools, research and upcoming events http://labs.idefense.com X. LEGAL NOTICES Copyright (c) 2006 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Apple Mail Command Execution Vulnerability SECUNIA ADVISORY ID: SA27785 VERIFY ADVISORY: http://secunia.com/advisories/27785/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: A vulnerability has been reported in Apple Mail, which can be exploited by malicious people to compromise a user's system. This can be exploited via a specially crafted email containing an attachment of an ostensibly safe file type (e.g. ".jpg") to execute arbitrary shell commands when the attachment is double-clicked. SOLUTION: Do not open attachments from untrusted sources. ORIGINAL ADVISORY: http://www.heise-security.co.uk/news/99257 OTHER REFERENCES: SA19064: http://secunia.com/advisories/19064/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Details of the fixes are available via the PHP web site (www.php.net). PHP ships with Mac OS X but is disabled by default. This could cause the systems to become unresponsive, or possibly allow arbitrary code delivered from the file servers to run on the target system. BOM CVE-ID: CVE-2006-0391 Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Directory traversal may occur while unpacking archives with BOM Description: The BOM framework handles the unpacking of certain types of archives. This framework is vulnerable to a directory traversal attack that can allow archived files to be unpacked into arbitrary locations that are writable by the current user. This update addresses the issue by properly sanitizing those paths. Credit to Stephane Kardas of CERTA for reporting this issue. This could lead to privilege elevation. This update addresses the issue by anticipating a hostile environment and by creating temporary files securely. Credit to Ilja van Sprundel of Suresec LTD, vade79, and iDefense (idefense.com) for reporting this issue. This update secures the method in which a FileVault image is created. This update addresses the issues by correctly handling the conditions that may cause crashes. Credit to OUSPG from the University of Oulu, NISCC, and CERT-FI for coordinating and reporting this issue. LibSystem CVE-ID: CVE-2005-3706 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Attackers may cause crashes or arbitrary code execution depending upon the application Description: An attacker able to cause an application to make requests for large amounts of memory may also be able to trigger a heap buffer overflow. This could cause the targeted application to crash or execute arbitrary code. This update addresses the issue by correctly handling these memory requests. This issue does not affect systems prior to Mac OS X v10.4. Credit to Neil Archibald of Suresec LTD for reporting this issue. Mail CVE-ID: CVE-2006-0395 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Download Validation fails to warn about unsafe file types Description: In Mac OS X v10.4 Tiger, when an email attachment is double-clicked in Mail, Download Validation is used to warn the user if the file type is not "safe". Certain techniques can be used to disguise the file's type so that Download Validation is bypassed. This update addresses the issue by presenting Download Validation with the entire file, providing more information for Download Validation to detect unknown or unsafe file types in attachments. perl CVE-ID: CVE-2005-4217 Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9 Impact: Perl programs may fail to drop privileges Description: When a perl program running as root attempts to switch to another user ID, the operation may fail without notification to the program. This may cause a program to continue to run with root privileges, assuming they have been dropped. This can cause security issues in third-party tools. This update addresses the issue by preventing such applications from continuing if the operation fails. This issue does not affect Mac OS X v10.4 or later systems. Credit to Jason Self for reporting this issue. rsync CVE-ID: CVE-2005-3712 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Authenticated users may cause an rsync server to crash or execute arbitrary code Description: A heap-based buffer overflow may be triggered when the rsync server is used with the flag that allows extended attributes to be transferred. It may be possible for a malicious user with access to an rsync server to cause denial of service or code execution. This update addresses the problem by ensuring that the destination buffer is large enough to hold the extended attributes. This issue does not affect systems prior to Mac OS X v10.4. Credit to Jan-Derk Bakker for reporting this issue. Safari CVE-ID: CVE-2005-4504 Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Viewing a maliciously-crafted web page may result in arbitrary code execution Description: A heap-based buffer overflow in WebKit's handling of certain HTML could allow a malicious web site to cause a crash or execute arbitrary code as the user viewing the site. This update addresses the issue by preventing the condition causing the overflow. Credit to Suresec LTD for reporting this issue. Safari CVE-ID: CVE-2006-0387 Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Viewing a malicious web page may cause arbitrary code execution Description: By preparing a web page including specially-crafted JavaScript, an attacker may trigger a stack buffer overflow that could lead to arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional bounds checking. An issue involving HTTP redirection can cause the browser to access a local file, bypassing certain restrictions. This update addresses the issue by preventing cross-domain HTTP redirects. When the "Open `safe' files after downloading" option is enabled in Safari's General preferences, visiting a malicious web site may result in the automatic download and execution of such a file. A proof-of-concept has been detected on public web sites that demonstrates the automatic execution of shell scripts. Syndication CVE-ID: CVE-2006-0389 Available for: Mac OS X v10.4.5, Mac OS X Server v10.4.5 Impact: Subscriptions to malicious RSS content can lead to cross-site scripting Description: Syndication (Safari RSS) may allow JavaScript code embedded in feeds to run within the context of the RSS reader document, allowing malicious feeds to circumvent Safari's security model. This update addresses the issue by properly removing JavaScript code from feeds. Syndication is only available in Mac OS X v10.4 and later. The following security enhancements are also included in this update: FileVault: AES-128 encrypted FileVault disk images are now created with more restrictive operating system permissions. Credit to Eric Hall of DarkArt Consulting Services for reporting this issue. iChat: A malicious application named Leap.A that attempts to propagate using iChat has been detected. Users should use caution when opening files that are obtained from the network. Further information is available via: http://docs.info.apple.com/article.html?artnum=108009 Security Update 2006-001 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ For Mac OS X v10.4.5 (PowerPC) and Mac OS X Server v10.4.5 The download file is named: "SecUpd2006-001Ti.dmg" Its SHA-1 digest is: 999b73a54951b4e0a7f873fecf75f92840e8b439 For Mac OS X v10.4.5 (Intel) The download file is named: "SecUpd2006-001Intel.dmg" Its SHA-1 digest is: 473f94264876fa49fa15a8b6bb4bc30956502ad5 For Mac OS X v10.3.9 The download file is named: "SecUpd2006-001Pan.dmg" Its SHA-1 digest is: b6a000d451a1b1696726ff60142fc3da08042433 For Mac OS X Server v10.3.9 The download file is named: "SecUpdSrvr2006-001Pan.dmg" Its SHA-1 digest is: 2299380d72a61eadcbd0a5c6f46c924600ff5a9c Information will also be posted to the Apple Product Security web site: http://docs.info.apple.com/article.html?artnum=61798 This message is signed with Apple's Product Security PGP key, and details are available at: http://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.5 (Build 5050) iQEVAwUBRAYYVoHaV5ucd/HdAQJQWggApQmizj2t3+/87Fqun66/HCEkFt2YhUoe cmel0/KwJhWrk+LV+CYvixbDvKuGIjP8CWB9/s78YN93pOI5WcfyTKd07rEQYkT4 i8KPrM9QjdvgIjKd6O/VAOkzBc3DqV7KNVR2Hewa3jOigTm7Yxil9o/nZt1TLxAI 9TN0uduc13WHC8WE2N41I8MQ+VdGTX3ANZkfgR90lua4A2E1ab9kCN2qbg+E7Cus SkwsKp0qSH7bl8v0/R6c1hsYG0T1RwSWU6arAEliqzrrIbCm0Yxtgwp/CYFWC46j TQNCcppNgcr/pVPojACy8WFtQ3wEb6rJ4ZjH1C5nOem2EoCBh10WFw== =1Ww0 -----END PGP SIGNATURE-----

Trust: 1.8

sources: NVD: CVE-2005-2713 // BID: 16907 // BID: 16910 // VULHUB: VHN-13922 // PACKETSTORM: 44339 // PACKETSTORM: 61082 // PACKETSTORM: 44321

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.3.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.9

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.8

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.8

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.9

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.3

Trust: 1.0

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

sources: BID: 16907 // BID: 16910 // CNNVD: CNNVD-200512-801 // NVD: CVE-2005-2713

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2713
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200512-801
value: MEDIUM

Trust: 0.6

VULHUB: VHN-13922
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-2713
severity: MEDIUM
baseScore: 6.8
vectorString: AV:L/AC:L/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13922
severity: MEDIUM
baseScore: 6.8
vectorString: AV:L/AC:L/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-13922 // CNNVD: CNNVD-200512-801 // NVD: CVE-2005-2713

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2713

THREAT TYPE

local

Trust: 1.0

sources: BID: 16910 // PACKETSTORM: 44339 // CNNVD: CNNVD-200512-801

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200512-801

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-13922

EXTERNAL IDS

db:NVDid:CVE-2005-2713

Trust: 2.5

db:BIDid:16910

Trust: 2.0

db:BIDid:16907

Trust: 2.0

db:OSVDBid:23646

Trust: 1.7

db:SECUNIAid:19064

Trust: 1.7

db:USCERTid:TA06-062A

Trust: 1.7

db:VUPENid:ADV-2006-0791

Trust: 1.7

db:CNNVDid:CNNVD-200512-801

Trust: 0.7

db:NSFOCUSid:8546

Trust: 0.6

db:NSFOCUSid:8245

Trust: 0.6

db:NSFOCUSid:8546※8245※8361※8246

Trust: 0.6

db:NSFOCUSid:8246

Trust: 0.6

db:NSFOCUSid:8361

Trust: 0.6

db:IDEFENSEid:20060302 APPLE MAC OS X PASSWD ARBITRARY BINARY FILE CREATION/MODIFICATION

Trust: 0.6

db:BUGTRAQid:20060302 [OSX]: /USR/BIN/PASSWD LOCAL ROOT EXPLOIT.

Trust: 0.6

db:CERT/CCid:TA06-062A

Trust: 0.6

db:APPLEid:APPLE-SA-2006-03-01

Trust: 0.6

db:XFid:25272

Trust: 0.6

db:PACKETSTORMid:44339

Trust: 0.2

db:EXPLOIT-DBid:1545

Trust: 0.1

db:VULHUBid:VHN-13922

Trust: 0.1

db:SECUNIAid:27785

Trust: 0.1

db:PACKETSTORMid:61082

Trust: 0.1

db:PACKETSTORMid:44321

Trust: 0.1

sources: VULHUB: VHN-13922 // BID: 16907 // BID: 16910 // PACKETSTORM: 44339 // PACKETSTORM: 61082 // PACKETSTORM: 44321 // CNNVD: CNNVD-200512-801 // NVD: CVE-2005-2713

REFERENCES

url:http://lists.apple.com/archives/security-announce/2006/mar/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/16907

Trust: 1.7

url:http://www.securityfocus.com/bid/16910

Trust: 1.7

url:http://www.us-cert.gov/cas/techalerts/ta06-062a.html

Trust: 1.7

url:http://docs.info.apple.com/article.html?artnum=303382

Trust: 1.7

url:http://www.idefense.com/intelligence/vulnerabilities/display.php?id=400

Trust: 1.7

url:http://www.osvdb.org/23646

Trust: 1.7

url:http://secunia.com/advisories/19064

Trust: 1.7

url:http://www.securityfocus.com/archive/1/426535/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/0791

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/25272

Trust: 1.1

url:http://www.apple.com/macosx/

Trust: 0.7

url:http://www.frsirt.com/english/advisories/2006/0791

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/426535/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/25272

Trust: 0.6

url:http://www.nsfocus.net/vulndb/8546※8245※8361※8246

Trust: 0.6

url:http://www.suresec.org/advisories/adv11.pdf

Trust: 0.3

url:/archive/1/426586

Trust: 0.3

url:/archive/1/426651

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2005-2713

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2005-2714

Trust: 0.2

url:http://docs.info.apple.com/article.html?artnum=61798

Trust: 0.2

url:http://www.idefense.com/poi/teams/vcp.jsp

Trust: 0.1

url:http://labs.idefense.com

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704

Trust: 0.1

url:http://www.apple.com/support/downloads

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.idefense.com/application/poi/display?type=vulnerabilities

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/27785/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://www.heise-security.co.uk/news/99257

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/19064/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0387

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-4504

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3712

Trust: 0.1

url:http://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0394

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0395

Trust: 0.1

url:https://www.php.net).

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-4217

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3319

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0383

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0384

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0388

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=108009

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3706

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3392

Trust: 0.1

sources: VULHUB: VHN-13922 // BID: 16907 // BID: 16910 // PACKETSTORM: 44339 // PACKETSTORM: 61082 // PACKETSTORM: 44321 // CNNVD: CNNVD-200512-801 // NVD: CVE-2005-2713

CREDITS

Stéphane Kardas

Trust: 0.6

sources: CNNVD: CNNVD-200512-801

SOURCES

db:VULHUBid:VHN-13922
db:BIDid:16907
db:BIDid:16910
db:PACKETSTORMid:44339
db:PACKETSTORMid:61082
db:PACKETSTORMid:44321
db:CNNVDid:CNNVD-200512-801
db:NVDid:CVE-2005-2713

LAST UPDATE DATE

2024-11-23T19:43:20.323000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-13922date:2018-10-19T00:00:00
db:BIDid:16907date:2006-04-11T19:02:00
db:BIDid:16910date:2006-03-03T06:51:00
db:CNNVDid:CNNVD-200512-801date:2006-05-15T00:00:00
db:NVDid:CVE-2005-2713date:2024-11-21T00:00:12.873

SOURCES RELEASE DATE

db:VULHUBid:VHN-13922date:2005-12-31T00:00:00
db:BIDid:16907date:2006-03-01T00:00:00
db:BIDid:16910date:2006-03-01T00:00:00
db:PACKETSTORMid:44339date:2006-03-03T10:19:50
db:PACKETSTORMid:61082date:2007-11-26T16:56:43
db:PACKETSTORMid:44321date:2006-03-03T08:09:05
db:CNNVDid:CNNVD-200512-801date:2005-11-14T00:00:00
db:NVDid:CVE-2005-2713date:2005-12-31T05:00:00