CVE-2003-0895
CVSS4.6
发布时间 :2003-11-03 00:00:00
修订时间 :2008-10-24 00:26:41
NMCOS    

[原文]Buffer overflow in the Mac OS X kernel 10.2.8 and earlier allows local users, and possibly remote attackers, to cause a denial of service (crash), access portions of memory, and possibly execute arbitrary code via a long command line argument (argv[]).


[CNNVD]MacOS X超长Argv值内核缓冲区溢出漏洞(CNNVD-200311-027)

        
        Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        通过指定超长命令行参数,本地攻击者可能导致Mac OS X内核崩溃。
        攻击者提供超长命令行参数可导致Mac OS X内核崩溃,能触发此条件的参数总数的长度允许在很小的一段范围中。当此问题产生时,操作系统会马上崩溃,不允许用户进行任何操作。没有任何日志产生,也不会出现任何内核崩溃消息。在几分钟后系统会自动重新启动。
        也可以利用这个漏洞DUMP出一小部分内核内存信息给攻击者,不过根据@stake调查,只有内存地址会返回给用户,一般不包含敏感信息。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x:10.2.3Apple Mac OS X 10.2.3
cpe:/o:apple:mac_os_x:10.2.2Apple Mac OS X 10.2.2
cpe:/o:apple:mac_os_x:10.2Apple Mac OS X 10.2
cpe:/o:apple:mac_os_x:10.2.7Apple Mac OS X 10.2.7
cpe:/o:apple:mac_os_x:10.2.8Apple Mac OS X 10.2.8
cpe:/o:apple:mac_os_x:10.2.1Apple Mac OS X 10.2.1
cpe:/o:apple:mac_os_x:10.2.4Apple Mac OS X 10.2.4
cpe:/o:apple:mac_os_x:10.2.6Apple Mac OS X 10.2.6
cpe:/o:apple:mac_os_x:10.2.5Apple Mac OS X 10.2.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0895
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0895
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200311-027
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/13541
(UNKNOWN)  XF  macos-long-command-bo(13541)
http://www.securityfocus.com/bid/8913
(VENDOR_ADVISORY)  BID  8913
http://www.atstake.com/research/advisories/2003/a102803-3.txt
(UNKNOWN)  ATSTAKE  A102803-3
http://lists.apple.com/mhonarc/security-announce/msg00038.html
(UNKNOWN)  CONFIRM  http://lists.apple.com/mhonarc/security-announce/msg00038.html

- 漏洞信息

MacOS X超长Argv值内核缓冲区溢出漏洞
中危 边界条件错误
2003-11-03 00:00:00 2006-03-28 00:00:00
本地  
        
        Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        通过指定超长命令行参数,本地攻击者可能导致Mac OS X内核崩溃。
        攻击者提供超长命令行参数可导致Mac OS X内核崩溃,能触发此条件的参数总数的长度允许在很小的一段范围中。当此问题产生时,操作系统会马上崩溃,不允许用户进行任何操作。没有任何日志产生,也不会出现任何内核崩溃消息。在几分钟后系统会自动重新启动。
        也可以利用这个漏洞DUMP出一小部分内核内存信息给攻击者,不过根据@stake调查,只有内存地址会返回给用户,一般不包含敏感信息。
        

- 公告与补丁

        厂商补丁:
        Apple
        -----
        Mac OS X 10.3已经修补这个问题:
        
        http://www.apple.com/macosx/

- 漏洞信息

6690
Apple Mac OS X Kernel argv Command Line Overflow
Local Access Required Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

A local overflow exists in Mac OS X. The kernel fails to validate arguments resulting in a buffer overflow. With a specially crafted request, an attacker can cause the kernel to crash resulting in a loss of availability.

- 时间线

2003-10-28 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 10.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

MacOS X Long Argv Value Kernel Buffer Overrun Vulnerability
Boundary Condition Error 8913
No Yes
2003-10-28 12:00:00 2009-07-11 11:56:00
The discovery of this vulnerability has been credited to @stake.

- 受影响的程序版本

Apple Mac OS X 10.2.8
Apple Mac OS X 10.2.7
Apple Mac OS X 10.2.6
Apple Mac OS X 10.2.5
Apple Mac OS X 10.2.4
Apple Mac OS X 10.2.3
Apple Mac OS X 10.2.2
Apple Mac OS X 10.2.1
Apple Mac OS X 10.2
Apple Mac OS X 10.3

- 不受影响的程序版本

Apple Mac OS X 10.3

- 漏洞讨论

A buffer overrun has been discovered in the MacOS X kernel when handling large argv values passed via the command-line. The precise details regarding this condition are currently unknown however the problem likely occurs due to insufficient bounds checking when handling user-supplied data. It has been confirmed that this condition can be exploited to cause a target kernel to crash.

- 漏洞利用

An attacker could exploit this condition to trigger a denial of service without the use of an exploit program. However, we are currently unaware of the existence of an exploit program designed to trigger this condition and execute arbitrary code or elevated privileges.

- 解决方案

Apple has stated that MacOS X 10.3 is not affected by this vulnerability. Users are advised to update as soon as possible. Further information regarding how to obtain this release can be found by referencing the following link:

http://www.apple.com/macosx/

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站