Vulnerability Name:

CVE-2007-6165 (CCN-38673)

Assigned:2007-11-20
Published:2007-11-20
Updated:2011-10-06
Summary:Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute arbitrary code via an AppleDouble attachment containing an apparently-safe file type and script in a resource fork, which does not warn the user that a separate program is going to be executed.
Note: this is a regression error related to CVE-2006-0395.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
CWE-20
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Mon Dec 17 2007 - 15:47:29 CST
Apple OS X Software Update Remote Command Execution

Source: MITRE
Type: CNA
CVE-2007-6165

Source: CONFIRM
Type: UNKNOWN
http://docs.info.apple.com/article.html?artnum=307179

Source: APPLE
Type: UNKNOWN
APPLE-SA-2007-12-17

Source: CCN
Type: SA27785
Apple Mail Command Execution Vulnerability

Source: SECUNIA
Type: Vendor Advisory
27785

Source: CCN
Type: SA28136
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
28136

Source: CCN
Type: SECTRACK ID: 1019106
Mac OS X Multiple Bugs Permit Remote Code Execution, Local Privilege Escalation, Cross-Site Scripting Attacks, and Information Disclosure

Source: SECTRACK
Type: UNKNOWN
1019106

Source: CCN
Type: Apple Web site
Mac OS X Leopard

Source: CCN
Type: Heise Security Web site
Apple Mail in Leopard with the same old error

Source: MISC
Type: Vendor Advisory
http://www.heise-security.co.uk/news/99257

Source: CCN
Type: US-CERT VU#433819
Apple Mail remote command execution vulnerability

Source: CERT-VN
Type: US Government Resource
VU#433819

Source: CCN
Type: OSVDB ID: 40875
Apple Mac OS X Mail Crafted AppleDouble Attachment Arbitrary Code Execution

Source: BID
Type: Exploit
26510

Source: CCN
Type: BID-26510
Apple Mac OS X Mail Arbitrary Code Execution Vulnerability

Source: CERT
Type: US Government Resource
TA07-352A

Source: VUPEN
Type: Vendor Advisory
ADV-2007-3958

Source: VUPEN
Type: Vendor Advisory
ADV-2007-4238

Source: XF
Type: UNKNOWN
macosx-unsafefiletype-command-execution(38673)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple mac os x 10.5
    apple mac os x 10.5
    apple mac os x 10.5.1
    apple mac os x server 10.5.1