Executive Summary

Informations
Name CVE-2004-0430 First vendor Publication 2004-07-07
Vendor Cve Last vendor Modification 2017-07-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P)
Cvss Base Score 5.1 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0430

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-47 Buffer Overflow via Parameter Expansion

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 30
Os 33

Open Source Vulnerability Database (OSVDB)

Id Description
5762 Apple Mac OS X AppleFileServer Pre-Authentication Remote Overflow

MacOS X contains a flaw that may allow a remote attacker to gain administrative privileges. The issue is due to a stack buffer overflow in the pre-authentication routine. The overflow occurs when the PathName argument from the LoginExt packet requests authentication using the Cleartext Password User Authentication Method (UAM). With a specially crafted request, an attacker can gain full administrative privilege over the machine remotely.

Snort® IPS/IDS

Date Description
2014-01-10 AFP FPLoginExt username buffer overflow attempt
RuleID : 2545-community - Revision : 7 - Type : SERVER-OTHER
2014-01-10 AFP FPLoginExt username buffer overflow attempt
RuleID : 2545 - Revision : 7 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2004-07-06 Name : The remote host is missing a Mac OS X update that fixes a security issue.
File : macosx_SecUpd20040503.nasl - Type : ACT_GATHER_INFO
2004-06-01 Name : The remote host is missing a Mac OS X update that fixes a security issue.
File : macosx_multiple_vulns.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/mhonarc/security-announce/msg00049.html
ATSTAKE http://www.atstake.com/research/advisories/2004/a050304-1.txt
CERT-VN http://www.kb.cert.org/vuls/id/648406
MISC http://www.securiteam.com/securitynews/5QP0115CUO.html
SECTRACK http://securitytracker.com/id?1010039
SECUNIA http://secunia.com/advisories/11539
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/16049

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2021-05-04 12:02:20
  • Multiple Updates
2021-04-22 01:02:28
  • Multiple Updates
2020-05-23 13:16:44
  • Multiple Updates
2020-05-23 01:36:03
  • Multiple Updates
2020-05-23 00:15:47
  • Multiple Updates
2017-07-11 12:01:26
  • Multiple Updates
2016-09-14 01:00:29
  • Multiple Updates
2016-08-05 12:00:50
  • Multiple Updates
2016-06-28 23:48:02
  • Multiple Updates
2016-04-27 09:22:17
  • Multiple Updates
2016-04-26 12:49:52
  • Multiple Updates
2014-02-17 10:27:31
  • Multiple Updates
2014-01-19 21:22:12
  • Multiple Updates
2013-05-11 11:41:36
  • Multiple Updates