发布时间 :2003-11-03 00:00:00
修订时间 :2008-10-24 00:26:41

[原文]Buffer overflow in the Mac OS X kernel 10.2.8 and earlier allows local users, and possibly remote attackers, to cause a denial of service (crash), access portions of memory, and possibly execute arbitrary code via a long command line argument (argv[]).

[CNNVD]MacOS X超长Argv值内核缓冲区溢出漏洞(CNNVD-200311-027)

        Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        通过指定超长命令行参数,本地攻击者可能导致Mac OS X内核崩溃。
        攻击者提供超长命令行参数可导致Mac OS X内核崩溃,能触发此条件的参数总数的长度允许在很小的一段范围中。当此问题产生时,操作系统会马上崩溃,不允许用户进行任何操作。没有任何日志产生,也不会出现任何内核崩溃消息。在几分钟后系统会自动重新启动。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x:10.2.3Apple Mac OS X 10.2.3
cpe:/o:apple:mac_os_x:10.2.2Apple Mac OS X 10.2.2
cpe:/o:apple:mac_os_x:10.2Apple Mac OS X 10.2
cpe:/o:apple:mac_os_x:10.2.7Apple Mac OS X 10.2.7
cpe:/o:apple:mac_os_x:10.2.8Apple Mac OS X 10.2.8
cpe:/o:apple:mac_os_x:10.2.1Apple Mac OS X 10.2.1
cpe:/o:apple:mac_os_x:10.2.4Apple Mac OS X 10.2.4
cpe:/o:apple:mac_os_x:10.2.6Apple Mac OS X 10.2.6
cpe:/o:apple:mac_os_x:10.2.5Apple Mac OS X 10.2.5

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  macos-long-command-bo(13541)

- 漏洞信息

MacOS X超长Argv值内核缓冲区溢出漏洞
中危 边界条件错误
2003-11-03 00:00:00 2006-03-28 00:00:00
        Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        通过指定超长命令行参数,本地攻击者可能导致Mac OS X内核崩溃。
        攻击者提供超长命令行参数可导致Mac OS X内核崩溃,能触发此条件的参数总数的长度允许在很小的一段范围中。当此问题产生时,操作系统会马上崩溃,不允许用户进行任何操作。没有任何日志产生,也不会出现任何内核崩溃消息。在几分钟后系统会自动重新启动。

- 公告与补丁

        Mac OS X 10.3已经修补这个问题:

- 漏洞信息

Apple Mac OS X Kernel argv Command Line Overflow
Local Access Required Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

A local overflow exists in Mac OS X. The kernel fails to validate arguments resulting in a buffer overflow. With a specially crafted request, an attacker can cause the kernel to crash resulting in a loss of availability.

- 时间线

2003-10-28 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 10.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

MacOS X Long Argv Value Kernel Buffer Overrun Vulnerability
Boundary Condition Error 8913
No Yes
2003-10-28 12:00:00 2009-07-11 11:56:00
The discovery of this vulnerability has been credited to @stake.

- 受影响的程序版本

Apple Mac OS X 10.2.8
Apple Mac OS X 10.2.7
Apple Mac OS X 10.2.6
Apple Mac OS X 10.2.5
Apple Mac OS X 10.2.4
Apple Mac OS X 10.2.3
Apple Mac OS X 10.2.2
Apple Mac OS X 10.2.1
Apple Mac OS X 10.2
Apple Mac OS X 10.3

- 不受影响的程序版本

Apple Mac OS X 10.3

- 漏洞讨论

A buffer overrun has been discovered in the MacOS X kernel when handling large argv values passed via the command-line. The precise details regarding this condition are currently unknown however the problem likely occurs due to insufficient bounds checking when handling user-supplied data. It has been confirmed that this condition can be exploited to cause a target kernel to crash.

- 漏洞利用

An attacker could exploit this condition to trigger a denial of service without the use of an exploit program. However, we are currently unaware of the existence of an exploit program designed to trigger this condition and execute arbitrary code or elevated privileges.

- 解决方案

Apple has stated that MacOS X 10.3 is not affected by this vulnerability. Users are advised to update as soon as possible. Further information regarding how to obtain this release can be found by referencing the following link:

- 相关参考