Vulnerability Name:
CVE-2005-0970 (CCN-20128)
Assigned:
2005-04-16
Published:
2005-04-16
Updated:
2009-10-14
Summary:
Mac OS X 10.3.9 and earlier allows users to install, create, and execute setuid/setgid scripts, contrary to the intended design, which may allow attackers to conduct unauthorized activities with escalated privileges via vulnerable scripts.
CVSS v3 Severity:
9.0 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
7.6 High
(CVSS v2 Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
High
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
7.6 High
(CCN CVSS v2 Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
High
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-264
Vulnerability Consequences:
Gain Privileges
References:
Source: MITRE
Type: CNA
CVE-2005-0970
Source: CCN
Type: Apple Web site
About the security content of the Mac OS X 10.3.9 Update
Source: APPLE
Type: UNKNOWN
APPLE-SA-2005-04-15
Source: CCN
Type: Mac OS X Web page
Apple - Mac OS X
Source: CCN
Type: Mac OS X Server Web page
Mac OS X Server
Source: CCN
Type: Apple Support Download Web page
Apple Downloads
Source: CCN
Type: CIAC INFORMATION BULLETIN P-185
Apple Mac OS X v10.3.9 Security Update
Source: CCN
Type: OSVDB ID: 15639
Apple Mac OS X SUID/SGID Scripts Allowed
Source: XF
Type: UNKNOWN
macos-setuid-setgid-gain-privileges(20128)
Vulnerable Configuration:
Configuration 1
:
cpe:/o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
apple
mac os x 10.0
apple
mac os x 10.0.1
apple
mac os x 10.0.2
apple
mac os x 10.0.3
apple
mac os x 10.0.4
apple
mac os x 10.1
apple
mac os x 10.1.1
apple
mac os x 10.1.2
apple
mac os x 10.1.3
apple
mac os x 10.1.4
apple
mac os x 10.1.5
apple
mac os x 10.2
apple
mac os x 10.2.1
apple
mac os x 10.2.2
apple
mac os x 10.2.3
apple
mac os x 10.2.4
apple
mac os x 10.2.5
apple
mac os x 10.2.6
apple
mac os x 10.2.7
apple
mac os x 10.2.8
apple
mac os x 10.3
apple
mac os x 10.3.1
apple
mac os x 10.3.2
apple
mac os x 10.3.3
apple
mac os x 10.3.4
apple
mac os x 10.3.5
apple
mac os x 10.3.6
apple
mac os x 10.3.7
apple
mac os x 10.3.8
apple
mac os x 10.3.9
apple
mac os x 10.3.7
apple
mac os x 10.2.8
apple
mac os x 10.3.5
apple
mac os x 10.3.6
apple
mac os x 10.3.8
apple
mac os x 10.3
apple
mac os x 10.2
apple
mac os x 10.3.9
apple
mac os x 10.1.5
apple
mac os x 10.3.2
apple
mac os x 10.2.3
apple
mac os x 10.0
apple
mac os x server 10.0.1
apple
mac os x server 10.0.2
apple
mac os x server 10.0.3
apple
mac os x 10.0.4
apple
mac os x 10.1
apple
mac os x 10.1.1
apple
mac os x 10.1.2
apple
mac os x 10.1.3
apple
mac os x 10.1.4
apple
mac os x 10.2.1
apple
mac os x 10.2.2
apple
mac os x 10.2.4
apple
mac os x 10.2.5
apple
mac os x 10.2.6
apple
mac os x 10.2.7
apple
mac os x 10.3.1
apple
mac os x 10.3.3
apple
mac os x 10.3.4