发布时间 :2001-09-11 00:00:00
修订时间 :2008-09-10 15:10:31

[原文]Find-By-Content in Mac OS X 10.0 through 10.0.4 creates world-readable index files named .FBCIndex in every directory, which allows remote attackers to learn the contents of files in web accessible directories.

[CNNVD]Apple Macintosh OS X FBCIndex 文件内容泄露漏洞(CNNVD-200109-036)

        Mac OS X 10.0到10.0.4版本中的Find-By-Content在每个目录中创建命名为.FBCIndex的世界可读索引文件,远程攻击者可以学习在Web访问目录中的文件内容。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x:10.0.4Apple Mac OS X 10.0.4
cpe:/o:apple:mac_os_x:10.0.3Apple Mac OS X 10.0.3
cpe:/o:apple:mac_os_x:10.0.2Apple Mac OS X 10.0.2
cpe:/o:apple:mac_os_x:10.0Apple Mac OS X 10.0
cpe:/o:apple:mac_os_x:10.0.1Apple Mac OS X 10.0.1

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  macos-apache-directory-disclosure(7103)
(UNKNOWN)  BUGTRAQ  20010910 Re: More security problems in Apache on Mac OS X
(UNKNOWN)  BID  3325

- 漏洞信息

Apple Macintosh OS X FBCIndex 文件内容泄露漏洞
高危 访问验证错误
2001-09-11 00:00:00 2005-10-20 00:00:00
        Mac OS X 10.0到10.0.4版本中的Find-By-Content在每个目录中创建命名为.FBCIndex的世界可读索引文件,远程攻击者可以学习在Web访问目录中的文件内容。

- 公告与补丁

        It is reported that this issue is addressed in the Apple Mac OS X and Mac OS X Server release versions 10.2 and above. This is not confirmed.

- 漏洞信息

Apple Mac OS X Find-By-Content .FBCIndex Web File Content Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Mac OS X contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when a .FBCIndex file is created by the Finder in the root of a web-accessible directory, which will disclose file content information resulting in a loss of confidentiality.

- 时间线

2001-09-10 Unknow
2001-09-10 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Use a <FilesMatch> directive in httpd.conf to restrict access to 'hidden' files: <FilesMatch '^.'> Order allow, deny Deny from all </FilesMatch> Restart Apache after the changes to the configuration file.

- 相关参考

- 漏洞作者