VARIoT IoT vulnerabilities database
![](/static/front/logo.webp)
VAR-200510-0137 | CVE-2005-2742 | Ruby library contains vulnerable default value |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
SecurityAgent in Apple Mac OS X 10.4.2, under certain circumstances, can cause the "Switch User..." button to appear even though the "Enable fast user switching" setting is disabled, which can allow attackers with physical access to gain access to the desktop and bypass the "Require password to wake this computer from sleep or screen saver" setting. Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code. Apple Mac OS X QuickDraw Manager contains a buffer overflow that may allow a remote attacker to execute arbitrary code.
Two vulnerabilities in Mail resulting in information disclosure.
A local privilege escalation vulnerability in malloc. This issue has been split into BID 14939.
An arbitrary code execution vulnerability in QuickDraw Manager.
A privilege escalation vulnerability in QuickTime for Java.
A cross-site scripting vulnerability in Safari.
An unauthorized access vulnerability in SecurityAgent.
A privilege escalation vulnerability in securityd. Security Agent is a powerful system security auxiliary tool in the Apple system.
1) A boundary error in ImageIO can be exploited to cause a buffer
overflow and may allow execution of arbitrary code on a user's system
when a specially crafted GIF file is opened e.g. in WebCore or
Safari.
2) An error in Mail.app when processing auto-reply rules can cause an
automatically generated response message to include a plain-text copy
of the encrypted message. This may disclose certain sensitive
information.
3) An error in Mail.app when using Kerberos 5 for SMTP authentication
can cause un-initialized memory to be appended to a message. This may
disclose certain sensitive information.
For more information:
SA16449
4) "malloc" creates diagnostic files insecurely when certain
environmental variables are set to enable debugging of application
memory allocation. This can be exploited by malicious, local users to
create or overwrite arbitrary files. from Safari,
Mail, or Finder.
6) A validation error in the Java extensions bundled with QuickTime
6.52 and earlier can be exploited by untrusted applets to call
arbitrary functions from system libraries. Systems with QuickTime 7
or later, or Mac OS X v10.4 or later, are not affected. Systems prior to Mac OS X v10.4
are not affected.
For more information:
SA15767
8) A validation error in Safari when rendering web archives from a
malicious site can be exploited to execute arbitrary HTML and script
code in a user's browser session in the context of another site.
10) A validation error in the Authorization Services "securityd"
allows unprivileged users to gain certain privileges that should be
restricted to administrative users. This can be exploited by
malicious, local users to gain escalated privileges.
SOLUTION:
Apply Security Update 2005-008.
Mac OS X 10.3.9:
http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html
Mac OS X 10.4.2:
http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html
PROVIDED AND/OR DISCOVERED BY:
2) Norbert Rittel, Rittel Consulting
3) MIT Kerberos Team
4) Ilja van Sprundel, Suresec LTD
5) Henrik Dalgaard, Echo One
6) Dino Dai Zovi
9) Luke Fowler, Indiana University Global Research Network Operations
Center
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=302413
OTHER REFERENCES:
SA15767:
http://secunia.com/advisories/15767/
SA16449:
http://secunia.com/advisories/16449/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
The vulnerability is caused due to an unspecified error in the XMLRPC
module, which may be exploited to execute arbitrary commands on a
vulnerable XMLRPC server.
The vulnerability has been reported in version 1.8.2. Prior versions
may also be affected.
SOLUTION:
The vulnerability has been fixed in the CVS repository
VAR-200510-0136 | CVE-2005-2741 | Ruby library contains vulnerable default value |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Authorization Services in securityd for Apple Mac OS X 10.3.9 allows local users to gain privileges by granting themselves certain rights that should be restricted to administrators. Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code. Apple Mac OS X QuickDraw Manager contains a buffer overflow that may allow a remote attacker to execute arbitrary code.
Two vulnerabilities in Mail resulting in information disclosure.
A local privilege escalation vulnerability in malloc. This issue has been split into BID 14939.
An arbitrary code execution vulnerability in QuickDraw Manager.
A privilege escalation vulnerability in QuickTime for Java.
A cross-site scripting vulnerability in Safari.
An unauthorized access vulnerability in SecurityAgent.
A privilege escalation vulnerability in securityd. Mac OS is an operating system running on Apple Macintosh series computers.
1) A boundary error in ImageIO can be exploited to cause a buffer
overflow and may allow execution of arbitrary code on a user's system
when a specially crafted GIF file is opened e.g. in WebCore or
Safari.
2) An error in Mail.app when processing auto-reply rules can cause an
automatically generated response message to include a plain-text copy
of the encrypted message. This may disclose certain sensitive
information.
3) An error in Mail.app when using Kerberos 5 for SMTP authentication
can cause un-initialized memory to be appended to a message. This may
disclose certain sensitive information.
For more information:
SA16449
4) "malloc" creates diagnostic files insecurely when certain
environmental variables are set to enable debugging of application
memory allocation. This can be exploited by malicious, local users to
create or overwrite arbitrary files. from Safari,
Mail, or Finder.
6) A validation error in the Java extensions bundled with QuickTime
6.52 and earlier can be exploited by untrusted applets to call
arbitrary functions from system libraries. Systems with QuickTime 7
or later, or Mac OS X v10.4 or later, are not affected. Systems prior to Mac OS X v10.4
are not affected.
For more information:
SA15767
8) A validation error in Safari when rendering web archives from a
malicious site can be exploited to execute arbitrary HTML and script
code in a user's browser session in the context of another site.
For more information:
SA16449
9) An error in the SecurityAgent may cause the "Switch User..."
button to be displayed even when the "Enable fast user switching"
setting has been disabled. This may allow malicious, local users to
access the current user's desktop without authentication even when
the "Require password to wake this computer from sleep or screen
saver" setting is enabled. This can be exploited by
malicious, local users to gain escalated privileges.
SOLUTION:
Apply Security Update 2005-008.
Mac OS X 10.3.9:
http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html
Mac OS X 10.4.2:
http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html
PROVIDED AND/OR DISCOVERED BY:
2) Norbert Rittel, Rittel Consulting
3) MIT Kerberos Team
4) Ilja van Sprundel, Suresec LTD
5) Henrik Dalgaard, Echo One
6) Dino Dai Zovi
9) Luke Fowler, Indiana University Global Research Network Operations
Center
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=302413
OTHER REFERENCES:
SA15767:
http://secunia.com/advisories/15767/
SA16449:
http://secunia.com/advisories/16449/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
The vulnerability is caused due to an unspecified error in the XMLRPC
module, which may be exploited to execute arbitrary commands on a
vulnerable XMLRPC server.
The vulnerability has been reported in version 1.8.2. Prior versions
may also be affected.
SOLUTION:
The vulnerability has been fixed in the CVS repository
VAR-200506-0244 | CVE-2005-1250 | Ipswitch WhatsUp Professional 'login.asp' SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter). This issue is due to a failure in the application to properly sanitize user-supplied input to the 'login.asp' script before using it in an SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. It should be noted that by supplying a 'or' value through the 'password' parameter, an attacker can gain unauthorized access to an affected site. WhatsUp Professional is a network management solution for SMBs
VAR-200512-0626 | CVE-2005-2757 | Mac OS X and OS X Server CoreFoundation Heap buffer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in CoreFoundation in Mac OS X and OS X Server 10.4 through 10.4.3 allows remote attackers to execute arbitrary code via unknown attack vectors involving "validation of URLs.". CoreFoundation is prone to a buffer-overflow vulnerability.
The issue presents itself when specially crafted URIs are handled.
A successful attack may result in a denial-of-service condition or remote unauthorized access because of arbitrary code execution in the context of the affected application.
NOTE: This issue was previously discussed in BID 15647 (Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities), but has been assigned its own record to better document the vulnerability.
For more information:
SA14530
2) An error in the Apache web server's "mod_ssl" module may be
exploited by malicious people to bypass certain security
restrictions.
For more information:
SA16700
3) A boundary error exists in CoreFoundation when resolving certain
URL.
4) An error in curl when handling NTLM authentication can be
exploited by malicious people to compromise a user's system.
For more information:
SA17193
5) An error exists in the ODBC Administrator utility helper tool
"iodbcadmintoo".
6) An error in OpenSSL when handling certain compatibility options
can potentially be exploited by malicious people to perform protocol
rollback attacks.
8) An integer overflow error exists in the PCRE library that is used
by Safari's JavaScript engine. This can potentially be exploited by
malicious people to compromise a user's system. This can be exploited to cause the download
file to be saved outside of the designated download directory.
For more information:
SA15474
11) A boundary error exists in WebKit when handling certain specially
crafted content.
For more information:
SA15744
13) The syslog server does not properly sanitise messages before
recording them.
SOLUTION:
Apply Security Update 2005-009.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES:
SA14530:
http://secunia.com/advisories/14530/
SA16700:
http://secunia.com/advisories/16700/
SA17193:
http://secunia.com/advisories/17193/
SA17151:
http://secunia.com/advisories/17151/
SA16502:
http://secunia.com/advisories/16502/
SA15474:
http://secunia.com/advisories/15474/
SA15744:
http://secunia.com/advisories/15744/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2005-11-29 Security Update 2005-009
Security Update 2005-009 is now available and delivers the following
security enhancements:
Apache2
CVE-ID: CVE-2005-2088
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Cross-site scripting may be possible in certain
configurations
Description: The Apache 2 web server may allow an attacker to bypass
protections using specially-crafted HTTP headers. This behavior is
only present when Apache is used in conjunction with certain proxy
servers, caching servers, or web application firewalls. This update
addresses the issue by incorporating Apache version 2.0.55. Only Apache configurations that
include the "SSLVerifyClient require" directive may be affected.
This update address the issue by incorporating mod_ssl 2.8.24 and
Apache version 2.0.55 (Mac OS X Server). CoreFoundation is used by Safari and other
applications. This update addresses the issue by performing
additional validation of URLs. This issue does not affect systems
prior to Mac OS X v10.4. This may cause a stack buffer overflow and lead to
arbitrary code execution. This update addresses the issue by
performing additional validation when using NTLM authentication.
This issue does not affect systems prior to Mac OS X v10.4.
iodbcadmintool
CVE-ID: CVE-2005-3700
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Local users may gain elevated privileges
Description: The ODBC Administrator utility includes a helper tool
called iodbcadmintool that executes with raised privileges. This
helper tool contains a vulnerability that may allow local users to
execute arbitrary commands with raised privileges. This update
addresses the issue by providing an updated iodbcadmintool that is
not susceptible. Such attacks may cause an SSL
connection to use the SSLv2 protocol which provides less protection
than SSLv3 or TLS. Further information on this issue is available at
http://www.openssl.org/news/secadv_20051011.txt. This update
addresses the issue by incorporating OpenSSL version 0.9.7i.
passwordserver
CVE-ID: CVE-2005-3701
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Local users on Open Directory master servers may gain
elevated privileges
Description: When creating an Open Directory master server,
credentials may be compromised. This could lead to unprivileged
local users gaining elevated privileges on the server. This update
addresses the issue by ensuring the credentials are protected. This may lead to the execution of arbitrary code. This
update addresses the issue by providing a new version of the
JavaScript engine that incorporates more robust input validation.
Safari
CVE-ID: CVE-2005-3702
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Safari may download files outside of the designated download
directory
Description: When files are downloaded in Safari they are normally
placed in the location specified as the download directory. However,
if a web site suggests an overlong filename for a download, it is
possible for Safari to create this file in other locations. Although
the filename and location of the downloaded file content cannot be
directly specified by remote servers, this may still lead to
downloading content into locations accessible to other users. This
update addresses the issue by rejecting overlong filenames.
Safari
CVE-ID: CVE-2005-3703
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: JavaScript dialog boxes in Safari may be misleading
Description: In Safari, JavaScript dialog boxes do not indicate the
web site that created them. This could mislead users into
unintentionally disclosing information to a web site. This update
addresses the issue by displaying the originating site name in
JavaScript dialog boxes. Credit to Jakob Balle of Secunia Research
for reporting this issue. This may be triggered by content
downloaded from malicious web sites in applications that use WebKit
such as Safari. This update addresses the issue by removing the heap
overflow from WebKit. Credit to Neil Archibald of Suresec LTD and
Marco Mella for reporting this issue. Although
the default configuration is not vulnerable to this issue, custom
sudo configurations may not properly restrict users. Further
information on this issue is available from:
http://www.sudo.ws/sudo/alerts/path_race.html
This update addresses the issue by incorporating sudo version
1.6.8p9.
syslog
CVE-ID: CVE-2005-3704
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: System log entries may be forged
Description: The system log server records syslog messages verbatim.
By supplying control characters such as the newline character, a
local attacker could forge entries with the intention to mislead the
system administrator. This update addresses the issue by specially
handling control characters and other non-printable characters. This
issue does not affect systems prior to Mac OS X v10.4. Credit to
HELIOS Software GmbH for reporting this issue.
Additional Information
Also included in this update are enhancements to Safari to improve
handling of credit card security codes (Mac OS X v10.3.9 and Mac OS X
v10.4.3), CoreTypes to improve handling of Terminal files (Mac OS X
v10.4.3), QuickDraw Manager to improve rendering of PICT files (Mac
OS X v10.3.9), documentation regarding OpenSSH and PAM (Mac OS X
v10.4.3), and ServerMigration to remove unneeded privileges.
Security Update 2005-009 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.4.3
The download file is named: "SecUpd2005-009Ti.dmg"
Its SHA-1 digest is: 544f51a7bc73a57dbca95e05693904aadb2f94b1
For Mac OS X Server v10.4.3
The download file is named: "SecUpdSrvr2005-009Ti.dmg"
Its SHA-1 digest is: b7620426151b8f1073c9ff73b2adf43b3086cc60
For Mac OS X v10.3.9
The download file is named: "SecUpd2005-009Pan.dmg"
Its SHA-1 digest is: ea17ad7852b3e6277f53c2863e51695ac7018650
For Mac OS X Server v10.3.9
The download file is named: "SecUpdSrvr2005-009Pan.dmg"
Its SHA-1 digest is: b03711729697ea8e6b683eb983343f2f3de3af13
Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.1 (Build 2185)
iQEVAwUBQ4zotIHaV5ucd/HdAQJiPAf/S7bsLZk3R7I8FBidCKQ/bxSxjhTFx8sK
vqsVFNDsXzv+tEa3IP58D8lI8lF94o+50p59qaPWxHzl4HxPVKlH4YCiBesYmVRp
FcGo0qbzj5wJzdWADPV+I8O+/CR5k8J35PuKDIzPabnO67nxoXc/DF6go50e5Hr9
Yqs2477ufq0ANd8wG9dF5pfcYwD8KRLfOmfJ9ZVhbG8Up0uO4JH71cTQZIFcKkYf
g6N9SCnqx5JqCwsRx85a8WuY1x97K3zqP53/bt4Wzi76VaaSaYj01nVywworTik4
YzOWOckJmWU9+66iby9mKY2mzz+u/vwtiMp577yT4y9FiSg6yp7mWQ==
=jnz9
-----END PGP SIGNATURE-----
VAR-200512-0289 | CVE-2005-3702 | Mac OS X and OS X Server Safari File download vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Safari in Mac OS X and OS X Server 10.3.9 and 10.4.3 allows remote attackers to cause files to be downloaded to locations outside the download directory via a long file name. Safari is prone to a remote directory-traversal vulnerability.
The vulnerability presents itself when a user tries to download a file from a remote location and the file name is excessively long.
NOTE: This issue was previously discussed in BID 15647 (Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities), but has been assigned its own record to better document the vulnerability.
For more information:
SA14530
2) An error in the Apache web server's "mod_ssl" module may be
exploited by malicious people to bypass certain security
restrictions.
For more information:
SA16700
3) A boundary error exists in CoreFoundation when resolving certain
URL.
4) An error in curl when handling NTLM authentication can be
exploited by malicious people to compromise a user's system.
For more information:
SA17193
5) An error exists in the ODBC Administrator utility helper tool
"iodbcadmintoo".
6) An error in OpenSSL when handling certain compatibility options
can potentially be exploited by malicious people to perform protocol
rollback attacks.
8) An integer overflow error exists in the PCRE library that is used
by Safari's JavaScript engine. This can potentially be exploited by
malicious people to compromise a user's system. This can be exploited to cause the download
file to be saved outside of the designated download directory.
For more information:
SA15474
11) A boundary error exists in WebKit when handling certain specially
crafted content.
For more information:
SA15744
13) The syslog server does not properly sanitise messages before
recording them.
SOLUTION:
Apply Security Update 2005-009.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES:
SA14530:
http://secunia.com/advisories/14530/
SA16700:
http://secunia.com/advisories/16700/
SA17193:
http://secunia.com/advisories/17193/
SA17151:
http://secunia.com/advisories/17151/
SA16502:
http://secunia.com/advisories/16502/
SA15474:
http://secunia.com/advisories/15474/
SA15744:
http://secunia.com/advisories/15744/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2005-11-29 Security Update 2005-009
Security Update 2005-009 is now available and delivers the following
security enhancements:
Apache2
CVE-ID: CVE-2005-2088
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Cross-site scripting may be possible in certain
configurations
Description: The Apache 2 web server may allow an attacker to bypass
protections using specially-crafted HTTP headers. This behavior is
only present when Apache is used in conjunction with certain proxy
servers, caching servers, or web application firewalls. This update
addresses the issue by incorporating Apache version 2.0.55. Only Apache configurations that
include the "SSLVerifyClient require" directive may be affected.
CoreFoundation
CVE-ID: CVE-2005-2757
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: Resolving a maliciously-crafted URL may result in crashes or
arbitrary code execution
Description: By carefully crafting a URL, an attacker can trigger a
heap buffer overflow in CoreFoundation which may result in a crash or
arbitrary code execution. CoreFoundation is used by Safari and other
applications. This update addresses the issue by performing
additional validation of URLs. This issue does not affect systems
prior to Mac OS X v10.4.
curl
CVE-ID: CVE-2005-3185
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: Visiting a malicious HTTP server and using NTLM
authentication may result in arbitrary code execution
Description: Using curl with NTLM authentication enabled to download
an HTTP resource may allow an attacker to supply an overlong user or
domain name. This may cause a stack buffer overflow and lead to
arbitrary code execution. This update addresses the issue by
performing additional validation when using NTLM authentication.
This issue does not affect systems prior to Mac OS X v10.4. This
helper tool contains a vulnerability that may allow local users to
execute arbitrary commands with raised privileges. This update
addresses the issue by providing an updated iodbcadmintool that is
not susceptible. Such attacks may cause an SSL
connection to use the SSLv2 protocol which provides less protection
than SSLv3 or TLS. Further information on this issue is available at
http://www.openssl.org/news/secadv_20051011.txt. This update
addresses the issue by incorporating OpenSSL version 0.9.7i. This could lead to unprivileged
local users gaining elevated privileges on the server. This update
addresses the issue by ensuring the credentials are protected. This may lead to the execution of arbitrary code. This
update addresses the issue by providing a new version of the
JavaScript engine that incorporates more robust input validation. However,
if a web site suggests an overlong filename for a download, it is
possible for Safari to create this file in other locations. Although
the filename and location of the downloaded file content cannot be
directly specified by remote servers, this may still lead to
downloading content into locations accessible to other users. This
update addresses the issue by rejecting overlong filenames. This could mislead users into
unintentionally disclosing information to a web site. This update
addresses the issue by displaying the originating site name in
JavaScript dialog boxes. Credit to Jakob Balle of Secunia Research
for reporting this issue. This may be triggered by content
downloaded from malicious web sites in applications that use WebKit
such as Safari. This update addresses the issue by removing the heap
overflow from WebKit. Credit to Neil Archibald of Suresec LTD and
Marco Mella for reporting this issue. Although
the default configuration is not vulnerable to this issue, custom
sudo configurations may not properly restrict users. Further
information on this issue is available from:
http://www.sudo.ws/sudo/alerts/path_race.html
This update addresses the issue by incorporating sudo version
1.6.8p9.
By supplying control characters such as the newline character, a
local attacker could forge entries with the intention to mislead the
system administrator. This update addresses the issue by specially
handling control characters and other non-printable characters. This
issue does not affect systems prior to Mac OS X v10.4. Credit to
HELIOS Software GmbH for reporting this issue
VAR-200512-0287 | CVE-2005-3700 | Mac OS X and OS X Server ODBC Administrator Unexplained execution of arbitrary code vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Unknown vulnerability in iodbcadmintool in the ODBC Administrator utility in Mac OS X and OS X Server 10.3.9 and 10.4.3 allows local users to execute arbitrary code via unknown attack vectors. The 'iodbcadmintool' utility is prone to a local privilege-escalation vulnerability.
This issue can allow local attackers to gain elevated privileges on an affected computer.
NOTE: This issue was previously discussed in BID 15647 (Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities), but has been assigned its own record to better document the vulnerability.
For more information:
SA14530
2) An error in the Apache web server's "mod_ssl" module may be
exploited by malicious people to bypass certain security
restrictions.
For more information:
SA16700
3) A boundary error exists in CoreFoundation when resolving certain
URL.
4) An error in curl when handling NTLM authentication can be
exploited by malicious people to compromise a user's system.
For more information:
SA17193
5) An error exists in the ODBC Administrator utility helper tool
"iodbcadmintoo".
6) An error in OpenSSL when handling certain compatibility options
can potentially be exploited by malicious people to perform protocol
rollback attacks.
8) An integer overflow error exists in the PCRE library that is used
by Safari's JavaScript engine. This can potentially be exploited by
malicious people to compromise a user's system. This can be exploited to cause the download
file to be saved outside of the designated download directory.
For more information:
SA15474
11) A boundary error exists in WebKit when handling certain specially
crafted content.
For more information:
SA15744
13) The syslog server does not properly sanitise messages before
recording them.
SOLUTION:
Apply Security Update 2005-009.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES:
SA14530:
http://secunia.com/advisories/14530/
SA16700:
http://secunia.com/advisories/16700/
SA17193:
http://secunia.com/advisories/17193/
SA17151:
http://secunia.com/advisories/17151/
SA16502:
http://secunia.com/advisories/16502/
SA15474:
http://secunia.com/advisories/15474/
SA15744:
http://secunia.com/advisories/15744/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2005-11-29 Security Update 2005-009
Security Update 2005-009 is now available and delivers the following
security enhancements:
Apache2
CVE-ID: CVE-2005-2088
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Cross-site scripting may be possible in certain
configurations
Description: The Apache 2 web server may allow an attacker to bypass
protections using specially-crafted HTTP headers. This behavior is
only present when Apache is used in conjunction with certain proxy
servers, caching servers, or web application firewalls. This update
addresses the issue by incorporating Apache version 2.0.55. Only Apache configurations that
include the "SSLVerifyClient require" directive may be affected.
This update address the issue by incorporating mod_ssl 2.8.24 and
Apache version 2.0.55 (Mac OS X Server). CoreFoundation is used by Safari and other
applications. This update addresses the issue by performing
additional validation of URLs. This issue does not affect systems
prior to Mac OS X v10.4. This may cause a stack buffer overflow and lead to
arbitrary code execution. This update addresses the issue by
performing additional validation when using NTLM authentication.
This issue does not affect systems prior to Mac OS X v10.4. This
helper tool contains a vulnerability that may allow local users to
execute arbitrary commands with raised privileges. This update
addresses the issue by providing an updated iodbcadmintool that is
not susceptible. Such attacks may cause an SSL
connection to use the SSLv2 protocol which provides less protection
than SSLv3 or TLS. Further information on this issue is available at
http://www.openssl.org/news/secadv_20051011.txt. This update
addresses the issue by incorporating OpenSSL version 0.9.7i. This update
addresses the issue by ensuring the credentials are protected. This may lead to the execution of arbitrary code. This
update addresses the issue by providing a new version of the
JavaScript engine that incorporates more robust input validation. However,
if a web site suggests an overlong filename for a download, it is
possible for Safari to create this file in other locations. Although
the filename and location of the downloaded file content cannot be
directly specified by remote servers, this may still lead to
downloading content into locations accessible to other users. This
update addresses the issue by rejecting overlong filenames.
Safari
CVE-ID: CVE-2005-3703
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: JavaScript dialog boxes in Safari may be misleading
Description: In Safari, JavaScript dialog boxes do not indicate the
web site that created them. This could mislead users into
unintentionally disclosing information to a web site. This update
addresses the issue by displaying the originating site name in
JavaScript dialog boxes. Credit to Jakob Balle of Secunia Research
for reporting this issue. This may be triggered by content
downloaded from malicious web sites in applications that use WebKit
such as Safari. This update addresses the issue by removing the heap
overflow from WebKit. Credit to Neil Archibald of Suresec LTD and
Marco Mella for reporting this issue. Although
the default configuration is not vulnerable to this issue, custom
sudo configurations may not properly restrict users. Further
information on this issue is available from:
http://www.sudo.ws/sudo/alerts/path_race.html
This update addresses the issue by incorporating sudo version
1.6.8p9.
syslog
CVE-ID: CVE-2005-3704
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: System log entries may be forged
Description: The system log server records syslog messages verbatim.
By supplying control characters such as the newline character, a
local attacker could forge entries with the intention to mislead the
system administrator. This update addresses the issue by specially
handling control characters and other non-printable characters. This
issue does not affect systems prior to Mac OS X v10.4. Credit to
HELIOS Software GmbH for reporting this issue.
Additional Information
Also included in this update are enhancements to Safari to improve
handling of credit card security codes (Mac OS X v10.3.9 and Mac OS X
v10.4.3), CoreTypes to improve handling of Terminal files (Mac OS X
v10.4.3), QuickDraw Manager to improve rendering of PICT files (Mac
OS X v10.3.9), documentation regarding OpenSSH and PAM (Mac OS X
v10.4.3), and ServerMigration to remove unneeded privileges.
Security Update 2005-009 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.4.3
The download file is named: "SecUpd2005-009Ti.dmg"
Its SHA-1 digest is: 544f51a7bc73a57dbca95e05693904aadb2f94b1
For Mac OS X Server v10.4.3
The download file is named: "SecUpdSrvr2005-009Ti.dmg"
Its SHA-1 digest is: b7620426151b8f1073c9ff73b2adf43b3086cc60
For Mac OS X v10.3.9
The download file is named: "SecUpd2005-009Pan.dmg"
Its SHA-1 digest is: ea17ad7852b3e6277f53c2863e51695ac7018650
For Mac OS X Server v10.3.9
The download file is named: "SecUpdSrvr2005-009Pan.dmg"
Its SHA-1 digest is: b03711729697ea8e6b683eb983343f2f3de3af13
Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.1 (Build 2185)
iQEVAwUBQ4zotIHaV5ucd/HdAQJiPAf/S7bsLZk3R7I8FBidCKQ/bxSxjhTFx8sK
vqsVFNDsXzv+tEa3IP58D8lI8lF94o+50p59qaPWxHzl4HxPVKlH4YCiBesYmVRp
FcGo0qbzj5wJzdWADPV+I8O+/CR5k8J35PuKDIzPabnO67nxoXc/DF6go50e5Hr9
Yqs2477ufq0ANd8wG9dF5pfcYwD8KRLfOmfJ9ZVhbG8Up0uO4JH71cTQZIFcKkYf
g6N9SCnqx5JqCwsRx85a8WuY1x97K3zqP53/bt4Wzi76VaaSaYj01nVywworTik4
YzOWOckJmWU9+66iby9mKY2mzz+u/vwtiMp577yT4y9FiSg6yp7mWQ==
=jnz9
-----END PGP SIGNATURE-----
VAR-200512-0291 | CVE-2005-3704 | Mac OS X and OS X Server Syslog server message spoofing vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
System log server in Mac OS X and OS X Server 10.4 through 10.4.3 allows remote attackers to spoof syslog messages in log files by injecting various control characters such as newline (NL). Apple has released Security Update 2005-008 to address multiple Mac OS X local and remote vulnerabilities.
NOTE: This BID is being retired because the issues are now documented in the following individual records:
16882 Apple Mac OS X CoreFoundation Remote Buffer Overflow Vulnerability
16903 Apple Mac OS X Iodbcadmintool Local Privilege Escalation Vulnerability
16904 Apple Mac OS X Passwordserver Local Privilege Escalation Vulnerability
16926 Apple Safari Remote Directory Traversal Vulnerability
29011 Apple Safari WebKit Unspecified Heap Overflow Vulnerability
14106 Apache HTTP Request Smuggling Vulnerability
14721 Apache Mod_SSL SSLVerifyClient Restriction Bypass Vulnerability
15102 Multiple Vendor WGet/Curl NTLM Username Buffer Overflow Vulnerability
15071 OpenSSL Insecure Protocol Negotiation Weakness
14620 PCRE Regular Expression Heap Overflow Vulnerability
14011 Apple Safari Dialog Box Origin Spoofing Vulnerability
13993 Todd Miller Sudo Local Race Condition Vulnerability.
For more information:
SA14530
2) An error in the Apache web server's "mod_ssl" module may be
exploited by malicious people to bypass certain security
restrictions.
For more information:
SA16700
3) A boundary error exists in CoreFoundation when resolving certain
URL.
4) An error in curl when handling NTLM authentication can be
exploited by malicious people to compromise a user's system.
For more information:
SA17193
5) An error exists in the ODBC Administrator utility helper tool
"iodbcadmintoo".
6) An error in OpenSSL when handling certain compatibility options
can potentially be exploited by malicious people to perform protocol
rollback attacks.
8) An integer overflow error exists in the PCRE library that is used
by Safari's JavaScript engine. This can potentially be exploited by
malicious people to compromise a user's system. This can be exploited to cause the download
file to be saved outside of the designated download directory.
For more information:
SA15474
11) A boundary error exists in WebKit when handling certain specially
crafted content.
For more information:
SA15744
13) The syslog server does not properly sanitise messages before
recording them.
SOLUTION:
Apply Security Update 2005-009.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES:
SA14530:
http://secunia.com/advisories/14530/
SA16700:
http://secunia.com/advisories/16700/
SA17193:
http://secunia.com/advisories/17193/
SA17151:
http://secunia.com/advisories/17151/
SA16502:
http://secunia.com/advisories/16502/
SA15474:
http://secunia.com/advisories/15474/
SA15744:
http://secunia.com/advisories/15744/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2005-11-29 Security Update 2005-009
Security Update 2005-009 is now available and delivers the following
security enhancements:
Apache2
CVE-ID: CVE-2005-2088
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Cross-site scripting may be possible in certain
configurations
Description: The Apache 2 web server may allow an attacker to bypass
protections using specially-crafted HTTP headers. This behavior is
only present when Apache is used in conjunction with certain proxy
servers, caching servers, or web application firewalls. This update
addresses the issue by incorporating Apache version 2.0.55. Only Apache configurations that
include the "SSLVerifyClient require" directive may be affected.
CoreFoundation
CVE-ID: CVE-2005-2757
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: Resolving a maliciously-crafted URL may result in crashes or
arbitrary code execution
Description: By carefully crafting a URL, an attacker can trigger a
heap buffer overflow in CoreFoundation which may result in a crash or
arbitrary code execution. CoreFoundation is used by Safari and other
applications. This update addresses the issue by performing
additional validation of URLs. This issue does not affect systems
prior to Mac OS X v10.4.
curl
CVE-ID: CVE-2005-3185
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: Visiting a malicious HTTP server and using NTLM
authentication may result in arbitrary code execution
Description: Using curl with NTLM authentication enabled to download
an HTTP resource may allow an attacker to supply an overlong user or
domain name. This may cause a stack buffer overflow and lead to
arbitrary code execution. This update addresses the issue by
performing additional validation when using NTLM authentication.
This issue does not affect systems prior to Mac OS X v10.4.
iodbcadmintool
CVE-ID: CVE-2005-3700
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Local users may gain elevated privileges
Description: The ODBC Administrator utility includes a helper tool
called iodbcadmintool that executes with raised privileges. This
helper tool contains a vulnerability that may allow local users to
execute arbitrary commands with raised privileges. This update
addresses the issue by providing an updated iodbcadmintool that is
not susceptible. Such attacks may cause an SSL
connection to use the SSLv2 protocol which provides less protection
than SSLv3 or TLS. Further information on this issue is available at
http://www.openssl.org/news/secadv_20051011.txt. This update
addresses the issue by incorporating OpenSSL version 0.9.7i.
passwordserver
CVE-ID: CVE-2005-3701
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Local users on Open Directory master servers may gain
elevated privileges
Description: When creating an Open Directory master server,
credentials may be compromised. This could lead to unprivileged
local users gaining elevated privileges on the server. This update
addresses the issue by ensuring the credentials are protected.
Safari
CVE-ID: CVE-2005-2491
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Processing a regular expressions may result in arbitrary
code execution
Description: The JavaScript engine in Safari uses a version of the
PCRE library that is vulnerable to a potentially exploitable heap
overflow. This may lead to the execution of arbitrary code. This
update addresses the issue by providing a new version of the
JavaScript engine that incorporates more robust input validation. However,
if a web site suggests an overlong filename for a download, it is
possible for Safari to create this file in other locations. Although
the filename and location of the downloaded file content cannot be
directly specified by remote servers, this may still lead to
downloading content into locations accessible to other users. This
update addresses the issue by rejecting overlong filenames.
Safari
CVE-ID: CVE-2005-3703
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: JavaScript dialog boxes in Safari may be misleading
Description: In Safari, JavaScript dialog boxes do not indicate the
web site that created them. This could mislead users into
unintentionally disclosing information to a web site. This update
addresses the issue by displaying the originating site name in
JavaScript dialog boxes. Credit to Jakob Balle of Secunia Research
for reporting this issue.
Safari
CVE-ID: CVE-2005-3705
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Visiting malicious web sites with WebKit-based applications
may lead to arbitrary code execution
Description: WebKit contains a heap overflow that may lead to the
execution of arbitrary code. This may be triggered by content
downloaded from malicious web sites in applications that use WebKit
such as Safari. This update addresses the issue by removing the heap
overflow from WebKit. Credit to Neil Archibald of Suresec LTD and
Marco Mella for reporting this issue. Although
the default configuration is not vulnerable to this issue, custom
sudo configurations may not properly restrict users. Further
information on this issue is available from:
http://www.sudo.ws/sudo/alerts/path_race.html
This update addresses the issue by incorporating sudo version
1.6.8p9.
By supplying control characters such as the newline character, a
local attacker could forge entries with the intention to mislead the
system administrator. This update addresses the issue by specially
handling control characters and other non-printable characters. This
issue does not affect systems prior to Mac OS X v10.4. Credit to
HELIOS Software GmbH for reporting this issue.
Additional Information
Also included in this update are enhancements to Safari to improve
handling of credit card security codes (Mac OS X v10.3.9 and Mac OS X
v10.4.3), CoreTypes to improve handling of Terminal files (Mac OS X
v10.4.3), QuickDraw Manager to improve rendering of PICT files (Mac
OS X v10.3.9), documentation regarding OpenSSH and PAM (Mac OS X
v10.4.3), and ServerMigration to remove unneeded privileges.
Security Update 2005-009 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.4.3
The download file is named: "SecUpd2005-009Ti.dmg"
Its SHA-1 digest is: 544f51a7bc73a57dbca95e05693904aadb2f94b1
For Mac OS X Server v10.4.3
The download file is named: "SecUpdSrvr2005-009Ti.dmg"
Its SHA-1 digest is: b7620426151b8f1073c9ff73b2adf43b3086cc60
For Mac OS X v10.3.9
The download file is named: "SecUpd2005-009Pan.dmg"
Its SHA-1 digest is: ea17ad7852b3e6277f53c2863e51695ac7018650
For Mac OS X Server v10.3.9
The download file is named: "SecUpdSrvr2005-009Pan.dmg"
Its SHA-1 digest is: b03711729697ea8e6b683eb983343f2f3de3af13
Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.1 (Build 2185)
iQEVAwUBQ4zotIHaV5ucd/HdAQJiPAf/S7bsLZk3R7I8FBidCKQ/bxSxjhTFx8sK
vqsVFNDsXzv+tEa3IP58D8lI8lF94o+50p59qaPWxHzl4HxPVKlH4YCiBesYmVRp
FcGo0qbzj5wJzdWADPV+I8O+/CR5k8J35PuKDIzPabnO67nxoXc/DF6go50e5Hr9
Yqs2477ufq0ANd8wG9dF5pfcYwD8KRLfOmfJ9ZVhbG8Up0uO4JH71cTQZIFcKkYf
g6N9SCnqx5JqCwsRx85a8WuY1x97K3zqP53/bt4Wzi76VaaSaYj01nVywworTik4
YzOWOckJmWU9+66iby9mKY2mzz+u/vwtiMp577yT4y9FiSg6yp7mWQ==
=jnz9
-----END PGP SIGNATURE-----
VAR-200512-0292 | CVE-2005-3705 | Apple Mac OS X Security hole |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in WebKit in Mac OS X and OS X Server 10.3.9 and 10.4.3, as used in applications such as Safari, allows remote attackers to execute arbitrary code via unknown attack vectors. Apple Safari is prone to a heap-overflow vulnerability.
Attackers may exploit this issue to execute arbitrary code or to crash the affected application. Other attacks are also possible.
For more information:
SA14530
2) An error in the Apache web server's "mod_ssl" module may be
exploited by malicious people to bypass certain security
restrictions.
For more information:
SA16700
3) A boundary error exists in CoreFoundation when resolving certain
URL.
4) An error in curl when handling NTLM authentication can be
exploited by malicious people to compromise a user's system.
For more information:
SA17193
5) An error exists in the ODBC Administrator utility helper tool
"iodbcadmintoo".
6) An error in OpenSSL when handling certain compatibility options
can potentially be exploited by malicious people to perform protocol
rollback attacks.
8) An integer overflow error exists in the PCRE library that is used
by Safari's JavaScript engine. This can potentially be exploited by
malicious people to compromise a user's system. This can be exploited to cause the download
file to be saved outside of the designated download directory.
For more information:
SA15474
11) A boundary error exists in WebKit when handling certain specially
crafted content.
For more information:
SA15744
13) The syslog server does not properly sanitise messages before
recording them.
SOLUTION:
Apply Security Update 2005-009.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES:
SA14530:
http://secunia.com/advisories/14530/
SA16700:
http://secunia.com/advisories/16700/
SA17193:
http://secunia.com/advisories/17193/
SA17151:
http://secunia.com/advisories/17151/
SA16502:
http://secunia.com/advisories/16502/
SA15474:
http://secunia.com/advisories/15474/
SA15744:
http://secunia.com/advisories/15744/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2005-11-29 Security Update 2005-009
Security Update 2005-009 is now available and delivers the following
security enhancements:
Apache2
CVE-ID: CVE-2005-2088
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Cross-site scripting may be possible in certain
configurations
Description: The Apache 2 web server may allow an attacker to bypass
protections using specially-crafted HTTP headers. This behavior is
only present when Apache is used in conjunction with certain proxy
servers, caching servers, or web application firewalls. This update
addresses the issue by incorporating Apache version 2.0.55. Only Apache configurations that
include the "SSLVerifyClient require" directive may be affected. CoreFoundation is used by Safari and other
applications. This update addresses the issue by performing
additional validation of URLs. This may cause a stack buffer overflow and lead to
arbitrary code execution. This update addresses the issue by
performing additional validation when using NTLM authentication. This
helper tool contains a vulnerability that may allow local users to
execute arbitrary commands with raised privileges. This update
addresses the issue by providing an updated iodbcadmintool that is
not susceptible. Such attacks may cause an SSL
connection to use the SSLv2 protocol which provides less protection
than SSLv3 or TLS. Further information on this issue is available at
http://www.openssl.org/news/secadv_20051011.txt. This update
addresses the issue by incorporating OpenSSL version 0.9.7i.
passwordserver
CVE-ID: CVE-2005-3701
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Local users on Open Directory master servers may gain
elevated privileges
Description: When creating an Open Directory master server,
credentials may be compromised. This could lead to unprivileged
local users gaining elevated privileges on the server. This update
addresses the issue by ensuring the credentials are protected. This may lead to the execution of arbitrary code. This
update addresses the issue by providing a new version of the
JavaScript engine that incorporates more robust input validation. However,
if a web site suggests an overlong filename for a download, it is
possible for Safari to create this file in other locations. Although
the filename and location of the downloaded file content cannot be
directly specified by remote servers, this may still lead to
downloading content into locations accessible to other users. This
update addresses the issue by rejecting overlong filenames. This could mislead users into
unintentionally disclosing information to a web site. This update
addresses the issue by displaying the originating site name in
JavaScript dialog boxes. Credit to Jakob Balle of Secunia Research
for reporting this issue. This may be triggered by content
downloaded from malicious web sites in applications that use WebKit
such as Safari. This update addresses the issue by removing the heap
overflow from WebKit. Credit to Neil Archibald of Suresec LTD and
Marco Mella for reporting this issue. Although
the default configuration is not vulnerable to this issue, custom
sudo configurations may not properly restrict users. Further
information on this issue is available from:
http://www.sudo.ws/sudo/alerts/path_race.html
This update addresses the issue by incorporating sudo version
1.6.8p9.
By supplying control characters such as the newline character, a
local attacker could forge entries with the intention to mislead the
system administrator. This update addresses the issue by specially
handling control characters and other non-printable characters. Credit to
HELIOS Software GmbH for reporting this issue.
Security Update 2005-009 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.4.3
The download file is named: "SecUpd2005-009Ti.dmg"
Its SHA-1 digest is: 544f51a7bc73a57dbca95e05693904aadb2f94b1
For Mac OS X Server v10.4.3
The download file is named: "SecUpdSrvr2005-009Ti.dmg"
Its SHA-1 digest is: b7620426151b8f1073c9ff73b2adf43b3086cc60
For Mac OS X v10.3.9
The download file is named: "SecUpd2005-009Pan.dmg"
Its SHA-1 digest is: ea17ad7852b3e6277f53c2863e51695ac7018650
For Mac OS X Server v10.3.9
The download file is named: "SecUpdSrvr2005-009Pan.dmg"
Its SHA-1 digest is: b03711729697ea8e6b683eb983343f2f3de3af13
Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.1 (Build 2185)
iQEVAwUBQ4zotIHaV5ucd/HdAQJiPAf/S7bsLZk3R7I8FBidCKQ/bxSxjhTFx8sK
vqsVFNDsXzv+tEa3IP58D8lI8lF94o+50p59qaPWxHzl4HxPVKlH4YCiBesYmVRp
FcGo0qbzj5wJzdWADPV+I8O+/CR5k8J35PuKDIzPabnO67nxoXc/DF6go50e5Hr9
Yqs2477ufq0ANd8wG9dF5pfcYwD8KRLfOmfJ9ZVhbG8Up0uO4JH71cTQZIFcKkYf
g6N9SCnqx5JqCwsRx85a8WuY1x97K3zqP53/bt4Wzi76VaaSaYj01nVywworTik4
YzOWOckJmWU9+66iby9mKY2mzz+u/vwtiMp577yT4y9FiSg6yp7mWQ==
=jnz9
-----END PGP SIGNATURE-----
VAR-200512-0288 | CVE-2005-3701 | Mac OS X Server passwordserver Unknown privilege escalation vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in passwordserver in Mac OS X Server 10.3.9 and 10.4.3, when creating an Open Directory master server, allows local users to gain privileges via unknown attack vectors. The 'passwordserver' tool is prone to a local privilege-escalation vulnerability.
NOTE: This issue was previously discussed in BID 15647 (Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities), but has been assigned its own record to better document the vulnerability.
For more information:
SA14530
2) An error in the Apache web server's "mod_ssl" module may be
exploited by malicious people to bypass certain security
restrictions.
For more information:
SA16700
3) A boundary error exists in CoreFoundation when resolving certain
URL.
4) An error in curl when handling NTLM authentication can be
exploited by malicious people to compromise a user's system.
For more information:
SA17193
5) An error exists in the ODBC Administrator utility helper tool
"iodbcadmintoo".
6) An error in OpenSSL when handling certain compatibility options
can potentially be exploited by malicious people to perform protocol
rollback attacks.
8) An integer overflow error exists in the PCRE library that is used
by Safari's JavaScript engine. This can potentially be exploited by
malicious people to compromise a user's system. This can be exploited to cause the download
file to be saved outside of the designated download directory.
For more information:
SA15474
11) A boundary error exists in WebKit when handling certain specially
crafted content.
For more information:
SA15744
13) The syslog server does not properly sanitise messages before
recording them.
SOLUTION:
Apply Security Update 2005-009.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES:
SA14530:
http://secunia.com/advisories/14530/
SA16700:
http://secunia.com/advisories/16700/
SA17193:
http://secunia.com/advisories/17193/
SA17151:
http://secunia.com/advisories/17151/
SA16502:
http://secunia.com/advisories/16502/
SA15474:
http://secunia.com/advisories/15474/
SA15744:
http://secunia.com/advisories/15744/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2005-11-29 Security Update 2005-009
Security Update 2005-009 is now available and delivers the following
security enhancements:
Apache2
CVE-ID: CVE-2005-2088
Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.3
Impact: Cross-site scripting may be possible in certain
configurations
Description: The Apache 2 web server may allow an attacker to bypass
protections using specially-crafted HTTP headers. This behavior is
only present when Apache is used in conjunction with certain proxy
servers, caching servers, or web application firewalls. This update
addresses the issue by incorporating Apache version 2.0.55.
apache_mod_ssl
CVE-ID: CVE-2005-2700
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: SSL client authentication may be bypassed in certain
configurations
Description: The Apache web server's mod_ssl module may allow an
attacker unauthorized access to a resource that is configured to
require SSL client authentication. Only Apache configurations that
include the "SSLVerifyClient require" directive may be affected.
This update address the issue by incorporating mod_ssl 2.8.24 and
Apache version 2.0.55 (Mac OS X Server).
CoreFoundation
CVE-ID: CVE-2005-2757
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: Resolving a maliciously-crafted URL may result in crashes or
arbitrary code execution
Description: By carefully crafting a URL, an attacker can trigger a
heap buffer overflow in CoreFoundation which may result in a crash or
arbitrary code execution. CoreFoundation is used by Safari and other
applications. This update addresses the issue by performing
additional validation of URLs. This issue does not affect systems
prior to Mac OS X v10.4.
curl
CVE-ID: CVE-2005-3185
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: Visiting a malicious HTTP server and using NTLM
authentication may result in arbitrary code execution
Description: Using curl with NTLM authentication enabled to download
an HTTP resource may allow an attacker to supply an overlong user or
domain name. This may cause a stack buffer overflow and lead to
arbitrary code execution. This update addresses the issue by
performing additional validation when using NTLM authentication.
This issue does not affect systems prior to Mac OS X v10.4. This
helper tool contains a vulnerability that may allow local users to
execute arbitrary commands with raised privileges. This update
addresses the issue by providing an updated iodbcadmintool that is
not susceptible.
OpenSSL
CVE-ID: CVE-2005-2969
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Applications using OpenSSL may be forced to use the weaker
SSLv2 protocol
Description: Applications that do not disable SSLv2 or that enable
certain compatibility options when using OpenSSL may be vulnerable to
a protocol downgrade attack. Such attacks may cause an SSL
connection to use the SSLv2 protocol which provides less protection
than SSLv3 or TLS. Further information on this issue is available at
http://www.openssl.org/news/secadv_20051011.txt. This update
addresses the issue by incorporating OpenSSL version 0.9.7i. This update
addresses the issue by ensuring the credentials are protected.
Safari
CVE-ID: CVE-2005-2491
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Processing a regular expressions may result in arbitrary
code execution
Description: The JavaScript engine in Safari uses a version of the
PCRE library that is vulnerable to a potentially exploitable heap
overflow. This may lead to the execution of arbitrary code. This
update addresses the issue by providing a new version of the
JavaScript engine that incorporates more robust input validation.
Safari
CVE-ID: CVE-2005-3702
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Safari may download files outside of the designated download
directory
Description: When files are downloaded in Safari they are normally
placed in the location specified as the download directory. However,
if a web site suggests an overlong filename for a download, it is
possible for Safari to create this file in other locations. Although
the filename and location of the downloaded file content cannot be
directly specified by remote servers, this may still lead to
downloading content into locations accessible to other users. This
update addresses the issue by rejecting overlong filenames.
Safari
CVE-ID: CVE-2005-3703
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: JavaScript dialog boxes in Safari may be misleading
Description: In Safari, JavaScript dialog boxes do not indicate the
web site that created them. This could mislead users into
unintentionally disclosing information to a web site. This update
addresses the issue by displaying the originating site name in
JavaScript dialog boxes. Credit to Jakob Balle of Secunia Research
for reporting this issue.
Safari
CVE-ID: CVE-2005-3705
Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
v10.4.3, Mac OS X Server v10.4.3
Impact: Visiting malicious web sites with WebKit-based applications
may lead to arbitrary code execution
Description: WebKit contains a heap overflow that may lead to the
execution of arbitrary code. This may be triggered by content
downloaded from malicious web sites in applications that use WebKit
such as Safari. This update addresses the issue by removing the heap
overflow from WebKit. Credit to Neil Archibald of Suresec LTD and
Marco Mella for reporting this issue. Although
the default configuration is not vulnerable to this issue, custom
sudo configurations may not properly restrict users. Further
information on this issue is available from:
http://www.sudo.ws/sudo/alerts/path_race.html
This update addresses the issue by incorporating sudo version
1.6.8p9.
syslog
CVE-ID: CVE-2005-3704
Available for: Mac OS X v10.4.3, Mac OS X Server v10.4.3
Impact: System log entries may be forged
Description: The system log server records syslog messages verbatim.
By supplying control characters such as the newline character, a
local attacker could forge entries with the intention to mislead the
system administrator. This update addresses the issue by specially
handling control characters and other non-printable characters. This
issue does not affect systems prior to Mac OS X v10.4. Credit to
HELIOS Software GmbH for reporting this issue.
Additional Information
Also included in this update are enhancements to Safari to improve
handling of credit card security codes (Mac OS X v10.3.9 and Mac OS X
v10.4.3), CoreTypes to improve handling of Terminal files (Mac OS X
v10.4.3), QuickDraw Manager to improve rendering of PICT files (Mac
OS X v10.3.9), documentation regarding OpenSSH and PAM (Mac OS X
v10.4.3), and ServerMigration to remove unneeded privileges.
Security Update 2005-009 may be obtained from the Software Update
pane in System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
For Mac OS X v10.4.3
The download file is named: "SecUpd2005-009Ti.dmg"
Its SHA-1 digest is: 544f51a7bc73a57dbca95e05693904aadb2f94b1
For Mac OS X Server v10.4.3
The download file is named: "SecUpdSrvr2005-009Ti.dmg"
Its SHA-1 digest is: b7620426151b8f1073c9ff73b2adf43b3086cc60
For Mac OS X v10.3.9
The download file is named: "SecUpd2005-009Pan.dmg"
Its SHA-1 digest is: ea17ad7852b3e6277f53c2863e51695ac7018650
For Mac OS X Server v10.3.9
The download file is named: "SecUpdSrvr2005-009Pan.dmg"
Its SHA-1 digest is: b03711729697ea8e6b683eb983343f2f3de3af13
Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798
This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.1 (Build 2185)
iQEVAwUBQ4zotIHaV5ucd/HdAQJiPAf/S7bsLZk3R7I8FBidCKQ/bxSxjhTFx8sK
vqsVFNDsXzv+tEa3IP58D8lI8lF94o+50p59qaPWxHzl4HxPVKlH4YCiBesYmVRp
FcGo0qbzj5wJzdWADPV+I8O+/CR5k8J35PuKDIzPabnO67nxoXc/DF6go50e5Hr9
Yqs2477ufq0ANd8wG9dF5pfcYwD8KRLfOmfJ9ZVhbG8Up0uO4JH71cTQZIFcKkYf
g6N9SCnqx5JqCwsRx85a8WuY1x97K3zqP53/bt4Wzi76VaaSaYj01nVywworTik4
YzOWOckJmWU9+66iby9mKY2mzz+u/vwtiMp577yT4y9FiSg6yp7mWQ==
=jnz9
-----END PGP SIGNATURE-----
VAR-200507-0224 | CVE-2005-2272 | Apple Safari Dialog spoofing vulnerability |
CVSS V2: 2.6 CVSS V3: - Severity: LOW |
Safari version 2.0 (412) does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability.".
An attacker may exploit this vulnerability to spoof an interface of a trusted web site. This issue may allow a remote attacker to carry out phishing style attacks. Safari is Apple's answer to browser software.
TITLE:
Mac OS X Security Update Fixes Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA17813
VERIFY ADVISORY:
http://secunia.com/advisories/17813/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Spoofing, Manipulation of
data, Exposure of sensitive information, Privilege escalation, DoS,
System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
Apple has issued a security update for Mac OS X, which fixes 13
vulnerabilities.
1) An error in the handling of HTTP headers in the Apache 2 web
server can be exploited by malicious people to conduct HTTP request
smuggling attacks when Apache is used in conjunction with certain
proxy servers, caching servers, or web application firewalls.
For more information:
SA14530
2) An error in the Apache web server's "mod_ssl" module may be
exploited by malicious people to bypass certain security
restrictions.
For more information:
SA16700
3) A boundary error exists in CoreFoundation when resolving certain
URL. This can be exploited to cause a heap-based buffer overflow and
may allow arbitrary code execution via a specially-crafted URL.
CoreFoundation is used by Safari and other applications.
4) An error in curl when handling NTLM authentication can be
exploited by malicious people to compromise a user's system.
For more information:
SA17193
5) An error exists in the ODBC Administrator utility helper tool
"iodbcadmintoo". This can be exploited by malicious, local users to
execute commands with escalated privileges.
6) An error in OpenSSL when handling certain compatibility options
can potentially be exploited by malicious people to perform protocol
rollback attacks.
For more information:
SA17151
7) An error in the passwordserver when handling the creation of an
Open Directory master server may cause certain credentials to be
disclosed. This can be exploited by unprivileged local users to gain
elevated privileges on the server.
8) An integer overflow error exists in the PCRE library that is used
by Safari's JavaScript engine. This can potentially be exploited by
malicious people to compromise a user's system.
For more information:
SA16502
9) An error exists in Safari when saving a downloaded file with an
overly long filename. This can be exploited to cause the download
file to be saved outside of the designated download directory.
10) JavaScript dialog boxes in Safari do not indicate the web site
that created them.
For more information:
SA15474
11) A boundary error exists in WebKit when handling certain specially
crafted content. This can be exploited to cause a heap-based buffer
overflow via content downloaded from malicious web sites in
applications that use WebKit such as Safari.
12) An error in sudo can be exploited by malicious, local users to
execute arbitrary commands with escalated privileges.
For more information:
SA15744
13) The syslog server does not properly sanitise messages before
recording them. This can be exploited to forge log entries and
mislead the system administrator by supplying messages certaining
control characters, such as the newline character, to the syslog
server.
SOLUTION:
Apply Security Update 2005-009.
Mac OS X 10.3.9 Client (Panther):
http://www.apple.com/support/downloads/securityupdate2005009pantherclient.html
Mac OS X 10.3.9 Server (Panther):
http://www.apple.com/support/downloads/securityupdate2005009pantherserver.html
Mac OS X 10.4.3 Client (Tiger):
http://www.apple.com/support/downloads/securityupdate2005009tigerclient.html
Mac OS X 10.4.3 Server (Tiger):
http://www.apple.com/support/downloads/securityupdate2005009tigerserver.html
PROVIDED AND/OR DISCOVERED BY:
10) Jakob Balle, Secunia Research.
11) Neil Archibald, Suresec LTD and Marco Mella.
13) HELIOS Software GmbH.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES:
SA14530:
http://secunia.com/advisories/14530/
SA16700:
http://secunia.com/advisories/16700/
SA17193:
http://secunia.com/advisories/17193/
SA17151:
http://secunia.com/advisories/17151/
SA16502:
http://secunia.com/advisories/16502/
SA15474:
http://secunia.com/advisories/15474/
SA15744:
http://secunia.com/advisories/15744/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Safari Dialog Origin Spoofing Vulnerability
SECUNIA ADVISORY ID:
SA15474
VERIFY ADVISORY:
http://secunia.com/advisories/15474/
CRITICAL:
Less critical
IMPACT:
Spoofing
WHERE:
>From remote
SOFTWARE:
Safari 1.x
http://secunia.com/product/1543/
DESCRIPTION:
Secunia Research has discovered a vulnerability in Safari, which can
be exploited by malicious web sites to spoof dialog boxes.
The problem is that JavaScript dialog boxes do not display or include
their origin, which allows a new window to open e.g.
Secunia has constructed a test, which can be used to check if your
browser is affected by this issue:
http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/
The vulnerability has been confirmed in version 2.0 (412). Prior
versions may also be affected.
SOLUTION:
Do not browse untrusted web sites while browsing trusted sites
VAR-200506-0141 | CVE-2005-2025 | Cisco IOS and Cisco PIX Firewall In VPN Vulnerability to get group name |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco VPN 3000 Concentrator before 4.1.7.F allows remote attackers to determine valid groupnames by sending an IKE Aggressive Mode packet with the groupname in the ID field, which generates a response if the groupname is valid, but does not generate a response for an invalid groupname. Cisco IOS and Cisco PIX Firewall In IKE Valid group names in aggressive mode messages / There are vulnerabilities whose responses differ depending on the invalidity. In addition, there is a vulnerability that can analyze the hash value from the response when requesting a valid group name.A valid group name and password hash may be obtained. Cisco VPN Concentrator is affected by a remote groupname enumeration weakness. This issue is due to a design error that could assist a remote attacker in enumerating groupnames.
Reportedly, once the attacker has verified a groupname they can obtain a password hash from an affected device and carry out bruteforce attacks against the password hash.
A valid groupname and password pair can allow the attacker to complete IKE Phase-1 authentication and carry out man-in-the-middle attacks against other users. This may ultimately allow the attacker to gain unauthorized access to the network.
All Cisco VPN Concentrator 3000 series products running groupname authentication are considered vulnerable to this issue.
This issue is tracked by the following Cisco BUG IDs:
CSCeg00323, CSCsb38075, and CSCsf25725 - for the Cisco VPN 3000 Series Concentrators
CSCei29901 - for the Cisco PIX 500 Series Security Appliances running code version 7.x
CSCei51783 - for the Cisco ASA 5500 Series Adaptive Security Appliances running code version 7.x
CSCsb26495 and CSCsb33172 - for Cisco IOS® software. Cisco VPN series hubs consist of a general-purpose remote access virtual private network (VPN) platform and client software that combines high availability, performance, and scalability with today's most advanced encryption and authentication technologies, providing professional operators with or enterprise users to provide services. A remote group name enumeration vulnerability exists in Cisco VPN hubs that could allow an attacker to use a dictionary program to determine valid group names on the hub
VAR-200506-0007 | CVE-2005-1942 | Cisco switches Bypass security check vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Cisco switches that support 802.1x security allow remote attackers to bypass port security and gain access to the VLAN via spoofed Cisco Discovery Protocol (CDP) messages. Catalyst is prone to a security bypass vulnerability
VAR-200506-0083 | CVE-2005-1878 | GIPTables Firewall 'temp.ip.addresses' Arbitrary file coverage vulnerability |
CVSS V2: 1.2 CVSS V3: - Severity: LOW |
GIPTables Firewall 1.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on the temp.ip.addresses temporary file. Giptables Firewall is prone to a local security vulnerability.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
GIPTables Firewall Insecure Temporary File Creation
SECUNIA ADVISORY ID:
SA15604
VERIFY ADVISORY:
http://secunia.com/advisories/15604/
CRITICAL:
Not critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
GIPTables Firewall 1.x
http://secunia.com/product/5214/
DESCRIPTION:
Eric Romang has reported a vulnerability in GIPTables Firewall, which
can be exploited by malicious, local users to perform certain actions
on a vulnerable system with escalated privileges.
The vulnerability is caused due to temporary files being created
insecurely.
The vulnerability has been reported in version 1.1 and prior.
SOLUTION:
Grant only trusted users access to affected systems.
PROVIDED AND/OR DISCOVERED BY:
Eric Romang, ZATAZ Audit
ORIGINAL ADVISORY:
http://www.zataz.net/adviso/giptables-05222005.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200506-0251 | No CVE | Cisco Voice VLAN 802.1x Authentication Bypass Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
IEEE 802.1X is a standard for authenticating network clients (or ports) based on user IDs or devices. An authentication bypass vulnerability exists in Cisco switches that allows an attacker to anonymously access a voice VLAN. An attacker can spoof CDP packets, play Cisco IP phones, and join voice VLANs anonymously. This may allow an attacker to access network resources without the expected 802.1x authentication. Because network administrators may think that switch port access is limited to authenticated users, it can lead to erroneous security awareness. Once an attacker gains access to a voice VLAN, they can launch further attacks on the server or host, or eavesdrop on VOIP sessions. Further network attacks are also possible at this point
VAR-200512-0648 | CVE-2005-2194 | Apple Mac OSX executes arbitrary widget with same "bundle identifier" as system widget |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in the Apple Mac OS X kernel before 10.4.2 allows remote attackers to cause a denial of service (kernel panic) via a crafted TCP packet, possibly related to source routing or loose source routing. Apple Mac OS X Tiger Dashboard executes arbitrary widgets with the same "bundle identifier" as a system widget. This can allow a user-installed widget to override a system-installed one. Apple Mac OS X is prone to a remote denial of service vulnerability. The issue exists due to a NULL pointer dereference that manifests in the kernel when specially crafted TCP/IP packets of an unspecified type are processed.
A remote attacker may exploit this condition to trigger a kernel panic on a target computer, effectively denying service for legitimate users.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Apple Mac OS X Two Vulnerabilities
SECUNIA ADVISORY ID:
SA16047
VERIFY ADVISORY:
http://secunia.com/advisories/16047/
CRITICAL:
Moderately critical
IMPACT:
Manipulation of data, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
Two vulnerabilities have been reported in Mac OS X, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
replace system widgets on a user's system.
2) An error in the Dashboard can be exploited to install widgets with
the same internal identifier (CFBundleIdentifier) as an Apple-supplied
widgets thereby replacing it.
SOLUTION:
Apply patches.
Mac OS X Server 10.4.2 Combo:
http://www.apple.com/support/downloads/macosxserver1042combo.html
Mac OS X Update 10.4.2:
http://www.apple.com/support/downloads/macosxupdate1042.html
Mac OS X Update 10.4.2 Combo:
http://www.apple.com/support/downloads/macosxupdate1042combo.html
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Julian Y. Koh.
2) mithras.the.prophet
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=301948
mithras.the.prophet:
http://www1.cs.columbia.edu/~aaron/files/widgets/
OTHER REFERENCES:
US-CERT VU#983429:
http://www.kb.cert.org/vuls/id/983429
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200512-0623 | CVE-2005-1726 | Apple Mac OS X Illegal access vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
The CoreGraphics Window Server in Mac OS X 10.4.1 allows local users with console access to gain privileges by "launching commands into root sessions.". Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues.
Successful exploitation allows execution of arbitrary code.
2) A bug in AFP Server when using an ACL-enabled storage volume may
in certain situations result in an ACL remaining attached when a file
with POSIX-only permissions is copied.
3) An input validation error can be exploited to access arbitrary
files on a Bluetooth-enabled system using directory traversal attacks
via the Bluetooth file and object exchange services.
4) A weakness in CoreGraphics can be exploited via a specially
crafted PDF document to crash an application using either PDFKit or
CoreGraphics to rendor PDF documents.
7) A race condition in the temporary file creation of launchd can be
exploited by malicious, local users to take ownership of arbitrary
files on the system.
8) An error in LaunchServices can result in file extensions and MIME
types marked as unsafe to bypass download safety checks if they're
not mapped to an Apple UTI (Uniform Type Identifier).
10) A security issue in NFS causes a NFS export restricted using
"-network" and "-mask" to be exported to "everyone".
11) Multiple vulnerabilities in PHP can be exploited by malicious
people to cause a DoS (Denial of Service) and potentially compromise
a vulnerable system.
For more information:
SA14792
12) A boundary error in vpnd can be exploited by malicious, local
users to cause a buffer overflow via an overly long Server_id
parameter and execute arbitrary code with escalated privileges on
systems configured as a VPN server.
SOLUTION:
Apply Security Update 2005-006.
Mac OS X 10.3.9:
http://www.apple.com/support/downloads/securityupdate2005006macosx1039.html
Mac OS X 10.4.1:
http://www.apple.com/support/downloads/securityupdate2005006macosx1041.html
PROVIDED AND/OR DISCOVERED BY:
3) Kevin Finisterre, digitalmunition.com.
4) Chris Evans
6) Michael Haller
7) Neil Archibald
12) Pieter de Boer
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=301742
OTHER REFERENCES:
SA14792:
http://secunia.com/advisories/14792/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200506-0229 | CVE-2005-1728 | Apple Mac OS X MCX Client security vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
MCX Client for Apple Mac OS X 10.4.x up to 10.4.1 insecurely logs Portable Home Directory credentials, which allows local users to obtain the credentials.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0228 | CVE-2005-1727 | Apple Mac OS X Privilege escalation vulnerability |
CVSS V2: 3.7 CVSS V3: - Severity: LOW |
Apple Mac OS X 10.4.x up to 10.4.1 sets insecure world- and group-writable permissions for the (1) system cache folder and (2) Dashboard system widgets, which allows local users to conduct unauthorized file operations via "file race conditions.". Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0227 | CVE-2005-1725 | Apple Mac OS X 'launchd 106' Security hole |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
launchd 106 in Apple Mac OS X 10.4.x up to 10.4.1 allows local users to overwrite arbitrary files via a symlink attack on the socket file in an insecure temporary directory. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0226 | CVE-2005-1724 | Apple Mac OS X Access restriction bypass vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
NFS on Apple Mac OS X 10.4.x up to 10.4.1 does not properly obey the -network or -mask flags for a filesystem and exports it to everyone, which allows remote attackers to bypass intended access restrictions. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues