ID

VAR-201003-0321


CVE

CVE-2010-0962


TITLE

Apple AirPort Express Such as FTP Intranet on proxy server FTP From the server TCP Vulnerability to be transferred

Trust: 0.8

sources: JVNDB: JVNDB-2010-003890

DESCRIPTION

The FTP proxy server in Apple AirPort Express, AirPort Extreme, and Time Capsule with firmware 7.5 does not restrict the IP address and port specified in a PORT command from a client, which allows remote attackers to leverage intranet FTP servers for arbitrary TCP forwarding via a crafted PORT command. Multiple Apple wireless products are prone to a security-bypass vulnerability. An attacker can exploit this issue to perform anonymous port scans on a victim's computer and send unsolicited emails and news. Other attacks are also possible. The following products are affected: Airport Express Firmware version 7.5 Airport Extreme Firmware version 7.5 Time Capsule Firmware version 7.5 Other products and versions may also be affected. An Apple AirPort device is a wireless access point that provides 802.11 services to network clients. The direct impact of this vulnerability is that for Airpor products that provide NAT to internal clients, users who can access the external forwarded FTP ports of these products can perform FTP server operations within the NAT by sending data to arbitrary addresses and ports

Trust: 1.98

sources: NVD: CVE-2010-0962 // JVNDB: JVNDB-2010-003890 // BID: 38543 // VULHUB: VHN-43567

AFFECTED PRODUCTS

vendor:applemodel:time capsulescope:eqversion:7.5

Trust: 2.7

vendor:applemodel:airport extremescope:eqversion:7.5

Trust: 1.9

vendor:applemodel:airport expressscope:eqversion:7.5

Trust: 1.6

vendor:applemodel:airmac expressscope: - version: -

Trust: 0.8

vendor:applemodel:time capsulescope:eqversion:7.4.2

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:airport extremescope:eqversion:7.4.2

Trust: 0.3

vendor:applemodel:airport extremescope:eqversion:0

Trust: 0.3

vendor:applemodel:airport expressscope:eqversion:0

Trust: 0.3

sources: BID: 38543 // JVNDB: JVNDB-2010-003890 // CNNVD: CNNVD-201003-156 // NVD: CVE-2010-0962

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0962
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0962
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201003-156
value: MEDIUM

Trust: 0.6

VULHUB: VHN-43567
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0962
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-43567
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-43567 // JVNDB: JVNDB-2010-003890 // CNNVD: CNNVD-201003-156 // NVD: CVE-2010-0962

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-43567 // JVNDB: JVNDB-2010-003890 // NVD: CVE-2010-0962

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201003-156

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201003-156

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003890

PATCH

title:Top Pageurl:http://www.apple.com/airportextreme/

Trust: 0.8

sources: JVNDB: JVNDB-2010-003890

EXTERNAL IDS

db:NVDid:CVE-2010-0962

Trust: 2.8

db:BIDid:38543

Trust: 2.0

db:JVNDBid:JVNDB-2010-003890

Trust: 0.8

db:CNNVDid:CNNVD-201003-156

Trust: 0.7

db:XFid:56701

Trust: 0.6

db:NSFOCUSid:14622

Trust: 0.6

db:BUGTRAQid:20100309 RE: APPLE AIRPORT WIRELESS PRODUCTS: PROMISCUOUS FTP PORT ALLOWED IN FTP PROXY PROVIDES SECURITY BYPASS

Trust: 0.6

db:BUGTRAQid:20100304 APPLE AIRPORT WIRELESS PRODUCTS: PROMISCUOUS FTP PORT ALLOWED IN FTP PROXY PROVIDES SECURITY BYPASS

Trust: 0.6

db:FULLDISCid:20100304 APPLE AIRPORT WIRELESS PRODUCTS: PROMISCUOUS FTP PORT ALLOWED IN FTP PROXY PROVIDES SECURITY BYPASS

Trust: 0.6

db:VULHUBid:VHN-43567

Trust: 0.1

sources: VULHUB: VHN-43567 // BID: 38543 // JVNDB: JVNDB-2010-003890 // CNNVD: CNNVD-201003-156 // NVD: CVE-2010-0962

REFERENCES

url:http://www.securityfocus.com/bid/38543

Trust: 1.7

url:http://seclists.org/fulldisclosure/2010/mar/106

Trust: 1.7

url:http://www.securityfocus.com/archive/1/509867/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/509974/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/56701

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0962

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0962

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/56701

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/509974/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/509867/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/14622

Trust: 0.6

url:http://www.apple.com

Trust: 0.3

url:/archive/1/509867

Trust: 0.3

url:/archive/1/509974

Trust: 0.3

sources: VULHUB: VHN-43567 // BID: 38543 // JVNDB: JVNDB-2010-003890 // CNNVD: CNNVD-201003-156 // NVD: CVE-2010-0962

CREDITS

Sabahattin Gucukoglu mail@sabahattin-gucukoglu.com

Trust: 0.6

sources: CNNVD: CNNVD-201003-156

SOURCES

db:VULHUBid:VHN-43567
db:BIDid:38543
db:JVNDBid:JVNDB-2010-003890
db:CNNVDid:CNNVD-201003-156
db:NVDid:CVE-2010-0962

LAST UPDATE DATE

2025-04-11T23:06:03.238000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-43567date:2018-10-10T00:00:00
db:BIDid:38543date:2015-04-13T21:02:00
db:JVNDBid:JVNDB-2010-003890date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-201003-156date:2010-03-12T00:00:00
db:NVDid:CVE-2010-0962date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-43567date:2010-03-10T00:00:00
db:BIDid:38543date:2010-03-04T00:00:00
db:JVNDBid:JVNDB-2010-003890date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-201003-156date:2010-03-10T00:00:00
db:NVDid:CVE-2010-0962date:2010-03-10T22:30:01.467