Vulnerability Name: | CVE-2005-0971 (CCN-20130) |
Assigned: | 2005-04-16 |
Published: | 2005-04-16 |
Updated: | 2008-09-05 |
Summary: | Stack-based buffer overflow in the semop system call in Mac OS X 10.3.9 and earlier allows local users to gain privileges via crafted arguments.
|
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2005-0971
Source: CCN Type: Apple Web site About the security content of the Mac OS X 10.3.9 Update
Source: APPLE Type: Vendor Advisory APPLE-SA-2005-04-15
Source: CCN Type: Mac OS X Web page Apple - Mac OS X
Source: CCN Type: Mac OS X Server Web page Mac OS X Server
Source: CCN Type: Apple Support Download Web page Apple Downloads
Source: CCN Type: CIAC INFORMATION BULLETIN P-185 Apple Mac OS X v10.3.9 Security Update
Source: CERT-VN Type: US Government Resource VU#212190
Source: CCN Type: OSVDB ID: 13103 Apple Mac OS X semop() System Call Kernel Overflow
Source: CCN Type: BID-13225 Apple Mac OS X Kernel Semop Local Stack-Based Buffer Overflow Vulnerability
Source: XF Type: UNKNOWN macos-semop-bo(20130)
|
Vulnerable Configuration: | Configuration 1: cpe:/o:apple:mac_os_x:10.0:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |