ID

VAR-200512-0648


CVE

CVE-2005-2194


TITLE

Apple Mac OSX executes arbitrary widget with same "bundle identifier" as system widget

Trust: 0.8

sources: CERT/CC: VU#983429

DESCRIPTION

Unspecified vulnerability in the Apple Mac OS X kernel before 10.4.2 allows remote attackers to cause a denial of service (kernel panic) via a crafted TCP packet, possibly related to source routing or loose source routing. Apple Mac OS X Tiger Dashboard executes arbitrary widgets with the same "bundle identifier" as a system widget. This can allow a user-installed widget to override a system-installed one. Apple Mac OS X is prone to a remote denial of service vulnerability. The issue exists due to a NULL pointer dereference that manifests in the kernel when specially crafted TCP/IP packets of an unspecified type are processed. A remote attacker may exploit this condition to trigger a kernel panic on a target computer, effectively denying service for legitimate users. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Apple Mac OS X Two Vulnerabilities SECUNIA ADVISORY ID: SA16047 VERIFY ADVISORY: http://secunia.com/advisories/16047/ CRITICAL: Moderately critical IMPACT: Manipulation of data, DoS WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: Two vulnerabilities have been reported in Mac OS X, which can be exploited by malicious people to cause a DoS (Denial of Service) or replace system widgets on a user's system. 2) An error in the Dashboard can be exploited to install widgets with the same internal identifier (CFBundleIdentifier) as an Apple-supplied widgets thereby replacing it. SOLUTION: Apply patches. Mac OS X Server 10.4.2 Combo: http://www.apple.com/support/downloads/macosxserver1042combo.html Mac OS X Update 10.4.2: http://www.apple.com/support/downloads/macosxupdate1042.html Mac OS X Update 10.4.2 Combo: http://www.apple.com/support/downloads/macosxupdate1042combo.html PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Julian Y. Koh. 2) mithras.the.prophet ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=301948 mithras.the.prophet: http://www1.cs.columbia.edu/~aaron/files/widgets/ OTHER REFERENCES: US-CERT VU#983429: http://www.kb.cert.org/vuls/id/983429 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2005-2194 // CERT/CC: VU#983429 // BID: 14241 // VULHUB: VHN-13403 // PACKETSTORM: 38649

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.4.1

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.4.2

Trust: 0.3

sources: CERT/CC: VU#983429 // BID: 14241 // CNNVD: CNNVD-200512-912 // NVD: CVE-2005-2194

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2194
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#983429
value: 1.58

Trust: 0.8

CNNVD: CNNVD-200512-912
value: MEDIUM

Trust: 0.6

VULHUB: VHN-13403
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-2194
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13403
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#983429 // VULHUB: VHN-13403 // CNNVD: CNNVD-200512-912 // NVD: CVE-2005-2194

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2194

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-912

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200512-912

EXTERNAL IDS

db:NVDid:CVE-2005-2194

Trust: 2.0

db:BIDid:14241

Trust: 1.4

db:SECUNIAid:16047

Trust: 1.3

db:OSVDBid:17880

Trust: 1.1

db:SECTRACKid:1014464

Trust: 1.1

db:CERT/CCid:VU#983429

Trust: 0.9

db:CNNVDid:CNNVD-200512-912

Trust: 0.7

db:APPLEid:APPLE-SA-2005-07-12

Trust: 0.6

db:VULHUBid:VHN-13403

Trust: 0.1

db:PACKETSTORMid:38649

Trust: 0.1

sources: CERT/CC: VU#983429 // VULHUB: VHN-13403 // BID: 14241 // PACKETSTORM: 38649 // CNNVD: CNNVD-200512-912 // NVD: CVE-2005-2194

REFERENCES

url:http://docs.info.apple.com/article.html?artnum=301948

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2005/jul/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/14241

Trust: 1.1

url:http://www.osvdb.org/17880

Trust: 1.1

url:http://securitytracker.com/id?1014464

Trust: 1.1

url:http://secunia.com/advisories/16047

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/21335

Trust: 1.1

url:http://www1.cs.columbia.edu/~aaron/files/widgets/

Trust: 0.9

url:http://docs.info.apple.com/article.html?artnum=301722

Trust: 0.8

url:http://developer.apple.com/documentation/appleapplications/conceptual/dashboard_tutorial/index.html

Trust: 0.8

url:http://www.apple.com/macosx/features/dashboard/

Trust: 0.8

url:http://www.appleinsider.com/article.php?id=1073

Trust: 0.8

url:http://developer.apple.com/qa/qa2004/qa1373.html

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/16047/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1042combo.html

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxupdate1042combo.html

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/983429

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxupdate1042.html

Trust: 0.1

sources: CERT/CC: VU#983429 // VULHUB: VHN-13403 // PACKETSTORM: 38649 // CNNVD: CNNVD-200512-912 // NVD: CVE-2005-2194

CREDITS

Discovery of this issue is credited to Julian Y. Koh.

Trust: 0.9

sources: BID: 14241 // CNNVD: CNNVD-200512-912

SOURCES

db:CERT/CCid:VU#983429
db:VULHUBid:VHN-13403
db:BIDid:14241
db:PACKETSTORMid:38649
db:CNNVDid:CNNVD-200512-912
db:NVDid:CVE-2005-2194

LAST UPDATE DATE

2024-08-14T14:08:48.664000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#983429date:2006-02-22T00:00:00
db:VULHUBid:VHN-13403date:2017-07-11T00:00:00
db:BIDid:14241date:2009-07-12T16:06:00
db:CNNVDid:CNNVD-200512-912date:2006-08-08T00:00:00
db:NVDid:CVE-2005-2194date:2017-07-11T01:32:47.250

SOURCES RELEASE DATE

db:CERT/CCid:VU#983429date:2005-06-08T00:00:00
db:VULHUBid:VHN-13403date:2005-12-31T00:00:00
db:BIDid:14241date:2005-07-12T00:00:00
db:PACKETSTORMid:38649date:2005-07-14T05:31:13
db:CNNVDid:CNNVD-200512-912date:2005-12-31T00:00:00
db:NVDid:CVE-2005-2194date:2005-12-31T05:00:00