ID

VAR-200704-0220


CVE

CVE-2007-0741


TITLE

Kerberos administration daemon may free uninitialized pointers

Trust: 0.8

sources: CERT/CC: VU#831452

DESCRIPTION

Buffer overflow in natd in network_cmds in Apple Mac OS X 10.3.9 through 10.4.9, when Internet Sharing is enabled, allows remote attackers to execute arbitrary code via malformed RTSP packets. A vulnerability exists in the Kerberos administration daemon that may allow a remote, unauthenticated user to free uninitialized pointers. Freeing uninitialized pointers corrupts memory in a way that could allow an attacker to execute code. This vulnerability occurs in an environment where Internet sharing is enabled.Third party crafted RTSP Arbitrary code could be executed by processing the packet. These issues affect Mac OS X and various applications, including AFP Client, AirPortDriver module, CoreServices, Libinfo, Login Window, Natd, SMB, System Configuration, URLMount, VideoConference framework, WebDAV, and WebFoundation. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, overwrite files, and access potentially sensitive information. Both local and remote vulnerabilities are present. This vulnerability only affects users who have Internet Sharing enabled. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Gentoo update for mit-krb5 SECUNIA ADVISORY ID: SA23903 VERIFY ADVISORY: http://secunia.com/advisories/23903/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Gentoo Linux 1.x http://secunia.com/product/339/ DESCRIPTION: Gentoo has issued an update for krb5. This fixes some vulnerabilities, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. For more information: SA23690 SA23696 SOLUTION: Update to "app-crypt/mit-krb5-1.5.2" or later. ORIGINAL ADVISORY: http://www.gentoo.org/security/en/glsa/glsa-200701-21.xml OTHER REFERENCES: SA23690: http://secunia.com/advisories/23690/ SA235696: http://secunia.com/advisories/23696/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2007-0741 // CERT/CC: VU#831452 // JVNDB: JVNDB-2007-000314 // BID: 23569 // VULHUB: VHN-24103 // PACKETSTORM: 53950

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.9

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.0

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mit kerberos teammodel: - scope: - version: -

Trust: 0.8

vendor:openpkgmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:rpathmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.9

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.9

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os preview.appscope:eqversion:x3.0.8

Trust: 0.3

sources: CERT/CC: VU#831452 // BID: 23569 // JVNDB: JVNDB-2007-000314 // CNNVD: CNNVD-200704-435 // NVD: CVE-2007-0741

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0741
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#831452
value: 20.93

Trust: 0.8

NVD: CVE-2007-0741
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200704-435
value: HIGH

Trust: 0.6

VULHUB: VHN-24103
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0741
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24103
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24103 // JVNDB: JVNDB-2007-000314 // CNNVD: CNNVD-200704-435 // NVD: CVE-2007-0741

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0741

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200704-435

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200704-435

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000314

PATCH

title:Security Update 2007-004 v1.1 (PPC)url:http://www.apple.com/support/downloads/securityupdate2007004v11ppc.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (10.3.9 Client)url:http://www.apple.com/support/downloads/securityupdate2007004v111039client.html

Trust: 0.8

title:Security Update 2007-004 (10.3.9 Server)url:http://www.apple.com/support/downloads/securityupdate20070041039server.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (Universal)url:http://www.apple.com/support/downloads/securityupdate2007004v11universal.html

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-en

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-ja

Trust: 0.8

title:Security Update 2007-004 (10.3.9 Server)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20070041039server.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (Universal)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11universal.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (PPC)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11ppc.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (10.3.9 Client)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v111039client.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000314

EXTERNAL IDS

db:BIDid:23569

Trust: 2.8

db:NVDid:CVE-2007-0741

Trust: 2.8

db:SECUNIAid:24966

Trust: 2.5

db:SECTRACKid:1017942

Trust: 2.5

db:USCERTid:TA07-109A

Trust: 2.5

db:VUPENid:ADV-2007-1470

Trust: 1.7

db:OSVDBid:34865

Trust: 1.7

db:SECUNIAid:23903

Trust: 0.9

db:BIDid:21975

Trust: 0.8

db:SECUNIAid:23701

Trust: 0.8

db:SECUNIAid:23706

Trust: 0.8

db:SECUNIAid:23667

Trust: 0.8

db:SECUNIAid:23690

Trust: 0.8

db:SECTRACKid:1017494

Trust: 0.8

db:CERT/CCid:VU#831452

Trust: 0.8

db:USCERTid:SA07-109A

Trust: 0.8

db:JVNDBid:JVNDB-2007-000314

Trust: 0.8

db:CNNVDid:CNNVD-200704-435

Trust: 0.7

db:CERT/CCid:TA07-109A

Trust: 0.6

db:APPLEid:APPLE-SA-2007-04-19

Trust: 0.6

db:VULHUBid:VHN-24103

Trust: 0.1

db:PACKETSTORMid:53950

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24103 // BID: 23569 // JVNDB: JVNDB-2007-000314 // PACKETSTORM: 53950 // CNNVD: CNNVD-200704-435 // NVD: CVE-2007-0741

REFERENCES

url:http://www.securityfocus.com/bid/23569

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta07-109a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1017942

Trust: 2.5

url:http://secunia.com/advisories/24966

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=305391

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2007/apr/msg00001.html

Trust: 1.7

url:http://www.osvdb.org/34865

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/1470

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/1470

Trust: 1.1

url:http://secunia.com/advisories/23903/

Trust: 0.9

url:http://secunia.com/advisories/23690/

Trust: 0.9

url:http://web.mit.edu/kerberos/www/advisories/mitkrb5-sa-2006-003-mechglue.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt.asc

Trust: 0.8

url:http://securitytracker.com/alerts/2007/jan/1017494.html

Trust: 0.8

url:http://www.securityfocus.com/bid/21975

Trust: 0.8

url:http://secunia.com/advisories/23706/

Trust: 0.8

url:http://secunia.com/advisories/23701/

Trust: 0.8

url:http://secunia.com/advisories/23667/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0741

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-109a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-109a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0741

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-109a.html

Trust: 0.8

url:http://www.info.apple.com/usen/security/security_updates.html

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://landonf.bikemonkey.org/2007/04/19#moab_fixes_net_a_bug.20070419203514.5302.timor

Trust: 0.3

url:http://labs.musecurity.com/advisories/mu-200704-01.txt

Trust: 0.3

url:http://www.gentoo.org/security/en/glsa/glsa-200701-21.xml

Trust: 0.1

url:http://secunia.com/advisories/23696/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/product/339/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-24103 // BID: 23569 // JVNDB: JVNDB-2007-000314 // PACKETSTORM: 53950 // CNNVD: CNNVD-200704-435 // NVD: CVE-2007-0741

CREDITS

Landon FullerMu SecurityDaniel BallGeoff FranksJamie Cox

Trust: 0.6

sources: CNNVD: CNNVD-200704-435

SOURCES

db:CERT/CCid:VU#831452
db:VULHUBid:VHN-24103
db:BIDid:23569
db:JVNDBid:JVNDB-2007-000314
db:PACKETSTORMid:53950
db:CNNVDid:CNNVD-200704-435
db:NVDid:CVE-2007-0741

LAST UPDATE DATE

2024-11-24T20:51:24.269000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#831452date:2007-05-10T00:00:00
db:VULHUBid:VHN-24103date:2011-03-08T00:00:00
db:BIDid:23569date:2007-05-02T20:29:00
db:JVNDBid:JVNDB-2007-000314date:2007-05-18T00:00:00
db:CNNVDid:CNNVD-200704-435date:2007-04-24T00:00:00
db:NVDid:CVE-2007-0741date:2024-11-21T00:26:38.090

SOURCES RELEASE DATE

db:CERT/CCid:VU#831452date:2007-01-09T00:00:00
db:VULHUBid:VHN-24103date:2007-04-24T00:00:00
db:BIDid:23569date:2007-04-19T00:00:00
db:JVNDBid:JVNDB-2007-000314date:2007-05-18T00:00:00
db:PACKETSTORMid:53950date:2007-01-27T01:46:45
db:CNNVDid:CNNVD-200704-435date:2007-04-24T00:00:00
db:NVDid:CVE-2007-0741date:2007-04-24T17:19:00