ID

VAR-201110-0300


CVE

CVE-2011-3436


TITLE

Apple Mac OS of Open Directory Vulnerable to bypassing password change restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2011-002486

DESCRIPTION

Open Directory in Apple Mac OS X 10.7 before 10.7.2 does not require a user to provide the current password before changing this password, which allows remote attackers to bypass intended password-change restrictions by leveraging an unattended workstation. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2011-006. The update addresses new vulnerabilities that affect Application Firewall, ATS, CFNetwork, CoreMedia, CoreProcesses, CoreStorage, File Systems, IOGraphics, Kernel, MediaKit, Open Directory, QuickTime, SMB File Server, User Documentation, and libsecurity. These issues affect OS X prior to 10.7.2. An attacker can exploit this issue to change a user's password, aiding further attacks. Apple has released updates to address these vulnerabilities. I. Apple has released updates to address these vulnerabilities. II. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. III. This advisory describes any known issues related to the updates and the specific impacts for each vulnerability. Administrators are encouraged to note these issues and impacts and test for any potentially adverse effects before wide-scale deployment. IV. Please send email to <cert@cert.org> with "TA11-286A Feedback VU#421739" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2011 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History October 13, 2011: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTpb8zj/GkGVXE7GMAQI21Af/SHWzIangqPW9vtuG/MQWSBMy9nG4wIZS DUEAWBEMPTKF3fLrIy6TVpRLN3q/q4dCYXzM4lec4IzKvEbV/bUyg15xEfYdxB0v s/vARGNwf7tjSbjo+PaHLuSZ1HLn/GLO3CXaf+ut/Kb8y9Fsir5klMgrCX/N0JkY dLoV9R6zGs1aQzmF9ULB1IQ2/lUkg6CGnyARh0prfhRFwKfu7NZXb8yz5ex68q6V NF6j9l+XK0Cl4K7R+0ESD4e47jLCg6iN175O8VzrlxiRvBRAyTaFycdMB4uSkmii xu8SqU2QFhsIJy8J+i1Bb6kuWkaxAnUbxO4tRrmXoqTXl9m0CtpnWA== =3Wp2 -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2011-3436 // JVNDB: JVNDB-2011-002486 // BID: 50085 // BID: 50146 // VULHUB: VHN-51381 // PACKETSTORM: 105790

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.7.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.7.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.7.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.7.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.7 and v10.7.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7 and v10.7.1

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.7.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.7

Trust: 0.6

vendor:applemodel:mac osscope:neversion:x10.7.2

Trust: 0.6

vendor:applemodel:mac os serverscope:neversion:x10.7.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7

Trust: 0.3

sources: BID: 50085 // BID: 50146 // JVNDB: JVNDB-2011-002486 // CNNVD: CNNVD-201110-345 // NVD: CVE-2011-3436

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3436
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-3436
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201110-345
value: MEDIUM

Trust: 0.6

VULHUB: VHN-51381
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-3436
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-51381
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51381 // JVNDB: JVNDB-2011-002486 // CNNVD: CNNVD-201110-345 // NVD: CVE-2011-3436

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-51381 // JVNDB: JVNDB-2011-002486 // NVD: CVE-2011-3436

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201110-345

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201110-345

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002486

PATCH

title:HT5002url:http://support.apple.com/kb/HT5002

Trust: 0.8

title:MacOSXUpd10.7.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=40893

Trust: 0.6

title:MacOSXServerUpd10.7.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=40892

Trust: 0.6

sources: JVNDB: JVNDB-2011-002486 // CNNVD: CNNVD-201110-345

EXTERNAL IDS

db:NVDid:CVE-2011-3436

Trust: 3.1

db:BIDid:50085

Trust: 1.4

db:OSVDBid:76370

Trust: 1.1

db:USCERTid:TA11-286A

Trust: 0.9

db:JVNDBid:JVNDB-2011-002486

Trust: 0.8

db:CNNVDid:CNNVD-201110-345

Trust: 0.7

db:SECUNIAid:46417

Trust: 0.6

db:APPLEid:APPLE-SA-2011-10-12-3

Trust: 0.6

db:BIDid:50146

Trust: 0.4

db:VULHUBid:VHN-51381

Trust: 0.1

db:PACKETSTORMid:105790

Trust: 0.1

sources: VULHUB: VHN-51381 // BID: 50085 // BID: 50146 // JVNDB: JVNDB-2011-002486 // PACKETSTORM: 105790 // CNNVD: CNNVD-201110-345 // NVD: CVE-2011-3436

REFERENCES

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html

Trust: 1.7

url:http://support.apple.com/kb/ht5002

Trust: 1.7

url:http://www.securityfocus.com/bid/50085

Trust: 1.1

url:http://osvdb.org/76370

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/70585

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3436

Trust: 0.8

url:http://jvn.jp/cert/jvnvu971123

Trust: 0.8

url:http://jvn.jp/cert/jvnta11-286a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3436

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta11-286a.html

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://secunia.com/advisories/46417

Trust: 0.6

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

url:http://www.us-cert.gov/cas/techalerts/ta11-286a.html>

Trust: 0.1

url:http://support.apple.com/kb/ht1338>

Trust: 0.1

url:http://support.apple.com/kb/ht5002>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

sources: VULHUB: VHN-51381 // BID: 50085 // BID: 50146 // JVNDB: JVNDB-2011-002486 // PACKETSTORM: 105790 // CNNVD: CNNVD-201110-345 // NVD: CVE-2011-3436

CREDITS

Anonymous, Apple, Will Dormann of the CERT/CC, Steven Michaud of Mozilla, Martin Tessarek, Steve Riggins of Geeks R Us, Justin C. Walker, Stephen Creswell, Erling Ellingsen of Facebook, Clint Tseng of the University of Washington, Michael Kobb, Adam Kemp,

Trust: 0.3

sources: BID: 50085

SOURCES

db:VULHUBid:VHN-51381
db:BIDid:50085
db:BIDid:50146
db:JVNDBid:JVNDB-2011-002486
db:PACKETSTORMid:105790
db:CNNVDid:CNNVD-201110-345
db:NVDid:CVE-2011-3436

LAST UPDATE DATE

2024-11-23T20:33:44.888000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51381date:2017-08-29T00:00:00
db:BIDid:50085date:2011-10-12T00:00:00
db:BIDid:50146date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-002486date:2011-10-25T00:00:00
db:CNNVDid:CNNVD-201110-345date:2011-10-17T00:00:00
db:NVDid:CVE-2011-3436date:2024-11-21T01:30:30.313

SOURCES RELEASE DATE

db:VULHUBid:VHN-51381date:2011-10-14T00:00:00
db:BIDid:50085date:2011-10-12T00:00:00
db:BIDid:50146date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-002486date:2011-10-25T00:00:00
db:PACKETSTORMid:105790date:2011-10-14T05:50:20
db:CNNVDid:CNNVD-201110-345date:2011-10-17T00:00:00
db:NVDid:CVE-2011-3436date:2011-10-14T10:55:11.197