Executive Summary
Summary | |
---|---|
Title | Apple Mac OS X fails to properly handle a crafted URL |
Informations | |||
---|---|---|---|
Name | VU#774345 | First vendor Publication | 2008-02-12 |
Vendor | VU-CERT | Last vendor Modification | 2008-02-12 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#774345Apple Mac OS X fails to properly handle a crafted URLOverviewA vulnerability in the way Apple Mac OS X handles specially crafted URLs may allow an attacker to execute arbitrary code.I. DescriptionAccording to Apple Security Update 2008-001:An input validation issue exists in the processing of URL schemes handled by Terminal.app. By enticing a user to visit a maliciously crafted web page, an attacker may cause an application to be launched with controlled command line arguments, which may lead to arbitrary code execution. Note that this vulnerability affects Apple Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 and v10.5.1, and Mac OS X Server v10.5 and v10.5.1. II. ImpactA remote, unauthenticated attacker may be able to execute arbitrary code.III. SolutionApply an updateThis issue is addressed in Apple Security Update 2008-001 and Apple Mac OS X 10.5.2.
References
This issue was reported in Apple Security Update 2008-001. Apple credits Olli Leppanen of Digital Film Finland and Brian Mastenbrook for reporting this issue. This document was written by Chris Taschner.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/774345 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2010-05-12 | Name : Mac OS X 10.5.2 Update / Mac OS X Security Update 2008-001 File : nvt/macosx_upd_10_5_2_secupd_2008-001.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
41503 | Apple Mac OS X Terminal.app Unspecified URL Handling Argument Injection A code execution flaw exists in Mac OS X. Terminal.app fails to validate URLs resulting in a controlled command-line execution. With a specially crafted URL, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-02-12 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_2.nasl - Type : ACT_GATHER_INFO |
2008-02-12 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-001.nasl - Type : ACT_GATHER_INFO |