Executive Summary

Informations
Name CVE-2008-4234 First vendor Publication 2008-12-16
Vendor Cve Last vendor Modification 2017-08-08

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Incomplete blacklist vulnerability in the Quarantine feature in CoreTypes in Apple Mac OS X 10.5 before 10.5.6 allows user-assisted remote attackers to execute arbitrary code via an executable file with the content type indicating no application association for the file, which does not trigger a "potentially unsafe" warning message.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4234

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 61
Os 59

OpenVAS Exploits

Date Description
2010-05-12 Name : Mac OS X 10.5.6 Update / Mac OS X Security Update 2008-008
File : nvt/macosx_upd_10_5_6_secupd_2008-008.nasl
2009-11-17 Name : Mac OS X Version
File : nvt/macosx_version.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
50958 Apple Mac OS X CoreTypes Quarantine Feature Blacklist Bypass

Mac OS X contains a flaw that may allow a malicious file to bypass Download Validation. The issue is triggered by file types that are executable, but have no associated programs. It is possible that the flaw may allow malicious programs to be executed resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2008-12-16 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_10_5_6.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
BID http://www.securityfocus.com/bid/32839
CERT http://www.us-cert.gov/cas/techalerts/TA08-350A.html
CONFIRM http://support.apple.com/kb/HT3338
SECTRACK http://www.securitytracker.com/id?1021400
SECUNIA http://secunia.com/advisories/33179
VUPEN http://www.vupen.com/english/advisories/2008/3444
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/47689

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2021-05-04 12:08:05
  • Multiple Updates
2021-04-22 01:08:26
  • Multiple Updates
2020-05-24 01:04:48
  • Multiple Updates
2020-05-23 00:22:18
  • Multiple Updates
2017-08-08 09:24:24
  • Multiple Updates
2016-09-01 01:01:18
  • Multiple Updates
2016-08-05 12:01:51
  • Multiple Updates
2016-06-29 00:01:14
  • Multiple Updates
2016-04-27 09:31:49
  • Multiple Updates
2016-04-26 17:51:23
  • Multiple Updates
2014-02-17 10:46:42
  • Multiple Updates
2013-05-11 00:27:02
  • Multiple Updates