ID

VAR-201110-0299


CVE

CVE-2011-3435


TITLE

Apple Mac OS X Vulnerabilities in browsing password data in Open Directory

Trust: 0.8

sources: JVNDB: JVNDB-2011-002516

DESCRIPTION

Open Directory in Apple Mac OS X 10.7 before 10.7.2 allows local users to read the password data of arbitrary users via unspecified vectors. The update addresses new vulnerabilities that affect Application Firewall, ATS, CFNetwork, CoreMedia, CoreProcesses, CoreStorage, File Systems, IOGraphics, Kernel, MediaKit, Open Directory, QuickTime, SMB File Server, User Documentation, and libsecurity. These issues affect OS X prior to 10.7.2. Apple Mac OS X is prone to an information-disclosure vulnerability. A local attacker can exploit this issue to retrieve a local user's password from the vulnerable computer. Information obtained may aid in further attacks. Apple Mac OS X Lion 10.7 and 10.7.1 are vulnerable. NOTE: This issue was previously discussed in BID 50085 (Apple Mac OS X Prior to 10.7.2 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple has released updates to address these vulnerabilities. I. Apple has released updates to address these vulnerabilities. II. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. III. This advisory describes any known issues related to the updates and the specific impacts for each vulnerability. Administrators are encouraged to note these issues and impacts and test for any potentially adverse effects before wide-scale deployment. IV. Please send email to <cert@cert.org> with "TA11-286A Feedback VU#421739" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2011 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History October 13, 2011: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTpb8zj/GkGVXE7GMAQI21Af/SHWzIangqPW9vtuG/MQWSBMy9nG4wIZS DUEAWBEMPTKF3fLrIy6TVpRLN3q/q4dCYXzM4lec4IzKvEbV/bUyg15xEfYdxB0v s/vARGNwf7tjSbjo+PaHLuSZ1HLn/GLO3CXaf+ut/Kb8y9Fsir5klMgrCX/N0JkY dLoV9R6zGs1aQzmF9ULB1IQ2/lUkg6CGnyARh0prfhRFwKfu7NZXb8yz5ex68q6V NF6j9l+XK0Cl4K7R+0ESD4e47jLCg6iN175O8VzrlxiRvBRAyTaFycdMB4uSkmii xu8SqU2QFhsIJy8J+i1Bb6kuWkaxAnUbxO4tRrmXoqTXl9m0CtpnWA== =3Wp2 -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2011-3435 // JVNDB: JVNDB-2011-002516 // BID: 50085 // BID: 50114 // VULHUB: VHN-51380 // PACKETSTORM: 105790

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.7.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.7.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.7.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.7.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.7 and v10.7.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7 and v10.7.1

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.7.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.7

Trust: 0.6

vendor:applemodel:mac osscope:neversion:x10.7.2

Trust: 0.6

vendor:applemodel:mac os serverscope:neversion:x10.7.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7

Trust: 0.3

sources: BID: 50085 // BID: 50114 // JVNDB: JVNDB-2011-002516 // CNNVD: CNNVD-201110-344 // NVD: CVE-2011-3435

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3435
value: LOW

Trust: 1.0

NVD: CVE-2011-3435
value: LOW

Trust: 0.8

CNNVD: CNNVD-201110-344
value: LOW

Trust: 0.6

VULHUB: VHN-51380
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2011-3435
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-51380
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51380 // JVNDB: JVNDB-2011-002516 // CNNVD: CNNVD-201110-344 // NVD: CVE-2011-3435

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-51380 // JVNDB: JVNDB-2011-002516 // NVD: CVE-2011-3435

THREAT TYPE

local

Trust: 0.9

sources: BID: 50114 // CNNVD: CNNVD-201110-344

TYPE

Unknown

Trust: 0.6

sources: BID: 50085 // BID: 50114

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002516

PATCH

title:HT5002url:http://support.apple.com/kb/HT5002

Trust: 0.8

sources: JVNDB: JVNDB-2011-002516

EXTERNAL IDS

db:NVDid:CVE-2011-3435

Trust: 3.1

db:BIDid:50085

Trust: 1.4

db:OSVDBid:76369

Trust: 1.1

db:USCERTid:TA11-286A

Trust: 0.9

db:JVNDBid:JVNDB-2011-002516

Trust: 0.8

db:CNNVDid:CNNVD-201110-344

Trust: 0.7

db:SECUNIAid:46417

Trust: 0.6

db:APPLEid:APPLE-SA-2011-10-12-3

Trust: 0.6

db:BIDid:50114

Trust: 0.4

db:VULHUBid:VHN-51380

Trust: 0.1

db:PACKETSTORMid:105790

Trust: 0.1

sources: VULHUB: VHN-51380 // BID: 50085 // BID: 50114 // JVNDB: JVNDB-2011-002516 // PACKETSTORM: 105790 // CNNVD: CNNVD-201110-344 // NVD: CVE-2011-3435

REFERENCES

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html

Trust: 1.7

url:http://support.apple.com/kb/ht5002

Trust: 1.7

url:http://www.securityfocus.com/bid/50085

Trust: 1.1

url:http://osvdb.org/76369

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/70584

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3435

Trust: 0.8

url:http://jvn.jp/cert/jvnvu971123

Trust: 0.8

url:http://jvn.jp/cert/jvnta11-286a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3435

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta11-286a.html

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://secunia.com/advisories/46417

Trust: 0.6

url:http://www.us-cert.gov/cas/techalerts/ta11-286a.html>

Trust: 0.1

url:http://support.apple.com/kb/ht1338>

Trust: 0.1

url:http://support.apple.com/kb/ht5002>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

sources: VULHUB: VHN-51380 // BID: 50085 // BID: 50114 // JVNDB: JVNDB-2011-002516 // PACKETSTORM: 105790 // CNNVD: CNNVD-201110-344 // NVD: CVE-2011-3435

CREDITS

Anonymous, Apple, Will Dormann of the CERT/CC, Steven Michaud of Mozilla, Martin Tessarek, Steve Riggins of Geeks R Us, Justin C. Walker, Stephen Creswell, Erling Ellingsen of Facebook, Clint Tseng of the University of Washington, Michael Kobb, Adam Kemp,

Trust: 0.3

sources: BID: 50085

SOURCES

db:VULHUBid:VHN-51380
db:BIDid:50085
db:BIDid:50114
db:JVNDBid:JVNDB-2011-002516
db:PACKETSTORMid:105790
db:CNNVDid:CNNVD-201110-344
db:NVDid:CVE-2011-3435

LAST UPDATE DATE

2024-11-23T19:31:37.272000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51380date:2017-08-29T00:00:00
db:BIDid:50085date:2011-10-12T00:00:00
db:BIDid:50114date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-002516date:2011-10-26T00:00:00
db:CNNVDid:CNNVD-201110-344date:2011-10-17T00:00:00
db:NVDid:CVE-2011-3435date:2024-11-21T01:30:30.200

SOURCES RELEASE DATE

db:VULHUBid:VHN-51380date:2011-10-14T00:00:00
db:BIDid:50085date:2011-10-12T00:00:00
db:BIDid:50114date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-002516date:2011-10-26T00:00:00
db:PACKETSTORMid:105790date:2011-10-14T05:50:20
db:CNNVDid:CNNVD-201110-344date:2011-10-17T00:00:00
db:NVDid:CVE-2011-3435date:2011-10-14T10:55:11.137