Vulnerability Name: | CVE-2003-0882 (CCN-13608) |
Assigned: | 2003-10-28 |
Published: | 2003-10-28 |
Updated: | 2008-09-05 |
Summary: | Mac OS X before 10.3 initializes the TCP timestamp with a constant number, which allows remote attackers to determine the system's uptime via the ID field in a TCP packet.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2003-0882
Source: CCN Type: AppleCare Knowledge Base Document 61798 Security Update 2003-08-14
Source: CONFIRM Type: Patch, Vendor Advisory http://docs.info.apple.com/article.html?artnum=61798
Source: CONFIRM Type: UNKNOWN http://lists.apple.com/mhonarc/security-announce/msg00038.html
Source: CCN Type: Apple Computer, Inc. Web site Apple - Mac OS X
Source: CCN Type: OSVDB ID: 6686 Apple Mac OS X TCP Timestamp ID Field Information Disclosure
Source: XF Type: UNKNOWN maxos-timestamp-uptime-disclosure(13608)
|
Vulnerable Configuration: | Configuration 1: cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* (Version <= 10.3) Configuration CCN 1: cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |