Vulnerability Name: | CVE-2010-0545 (CCN-59457) | ||||||||
Assigned: | 2010-06-15 | ||||||||
Published: | 2010-06-15 | ||||||||
Updated: | 2010-06-17 | ||||||||
Summary: | The Finder in DesktopServices in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, does not set the expected file ownerships during an "Apply to enclosed items" action, which allows local users to bypass intended access restrictions via normal filesystem operations. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Other | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-0545 Source: APPLE Type: Vendor Advisory APPLE-SA-2010-06-15-1 Source: CCN Type: SA40220 Apple Mac OS X Security Update Fixes Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 40220 Source: CCN Type: SECTRACK ID: 1024103 Mac OS X Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Upload/Access Files and Local Users Gain Elevated Privileges Source: SECTRACK Type: UNKNOWN 1024103 Source: CCN Type: Apple KB HT4188 About the security content of Security Update 2010-004 / Mac OS X v10.6.4 Source: CONFIRM Type: Patch, Vendor Advisory http://support.apple.com/kb/HT4188 Source: CCN Type: OSVDB ID: 65558 Apple Mac OS X DesktopServices Finder File Ownership Setting Weakness Local Access Restriction Bypass Source: BID Type: Patch 40871 Source: CCN Type: BID-40871 RETIRED: Apple Mac OS X Prior to 10.6.4 Multiple Security Vulnerabilities Source: CCN Type: BID-40898 Apple Mac OS X DesktopServices Component Insecure File Permissions Vulnerability Source: VUPEN Type: Patch, Vendor Advisory ADV-2010-1481 Source: XF Type: UNKNOWN macosx-desktopservices-weak-security(59457) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |