CVE-2004-0927
CVSS5.0
发布时间 :2005-01-27 00:00:00
修订时间 :2008-09-05 16:39:49
NMCOS    

[原文]ServerAdmin in Mac OS X 10.2.8 through 10.3.5 uses the same example self-signed certificate on each system, which allows remote attackers to decrypt sessions.


[CNNVD]Apple MacOS ServerAdmin 默认证书漏洞(CNNVD-200501-287)

        Apple Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        Apple Mac OS X 10.2.8至10.3.5版本中,存在信息泄露漏洞。由于上述版本中,ServerAdmin使用同样的默认的自签名证书,远程攻击者可以通过网络嗅探,对通信会话进行解密,获得敏感信息

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x:10.2Apple Mac OS X 10.2
cpe:/o:apple:mac_os_x_server:10.2.1Apple Mac OS X Server 10.2.1
cpe:/a:easy_software_products:cups:1.1.4_5
cpe:/o:apple:mac_os_x:10.2.5Apple Mac OS X 10.2.5
cpe:/o:apple:mac_os_x_server:10.2Apple Mac OS X Server 10.2
cpe:/o:apple:mac_os_x_server:10.2.4Apple Mac OS X Server 10.2.4
cpe:/a:easy_software_products:cups:1.1.4_3
cpe:/a:easy_software_products:cups:1.1.4_2
cpe:/a:easy_software_products:cups:1.1.16
cpe:/o:apple:mac_os_x:10.2.1Apple Mac OS X 10.2.1
cpe:/o:apple:mac_os_x:10.2.6Apple Mac OS X 10.2.6
cpe:/a:easy_software_products:cups:1.1.18
cpe:/a:easy_software_products:cups:1.1.7
cpe:/a:easy_software_products:cups:1.1.13
cpe:/a:easy_software_products:cups:1.1.20
cpe:/a:easy_software_products:cups:1.1.4
cpe:/a:easy_software_products:cups:1.1.10
cpe:/o:apple:mac_os_x:10.3Apple Mac OS X 10.3
cpe:/o:apple:mac_os_x_server:10.2.2Apple Mac OS X Server 10.2.2
cpe:/o:apple:mac_os_x:10.3.1Apple Mac OS X 10.3.1
cpe:/o:apple:mac_os_x:10.2.7Apple Mac OS X 10.2.7
cpe:/o:apple:mac_os_x_server:10.2.6Apple Mac OS X Server 10.2.6
cpe:/o:apple:mac_os_x_server:10.3.5Apple Mac OS X Server 10.3.5
cpe:/a:easy_software_products:cups:1.1.19_rc5
cpe:/a:easy_software_products:cups:1.1.14
cpe:/o:apple:mac_os_x:10.2.2Apple Mac OS X 10.2.2
cpe:/o:apple:mac_os_x_server:10.2.7Apple Mac OS X Server 10.2.7
cpe:/o:apple:mac_os_x:10.3.3Apple Mac OS X 10.3.3
cpe:/a:easy_software_products:cups:1.1.15
cpe:/a:easy_software_products:cups:1.1.1
cpe:/o:apple:mac_os_x:10.2.4Apple Mac OS X 10.2.4
cpe:/a:easy_software_products:cups:1.0.4
cpe:/o:apple:mac_os_x_server:10.3.3Apple Mac OS X Server 10.3.3
cpe:/o:apple:mac_os_x_server:10.3.4Apple Mac OS X Server 10.3.4
cpe:/o:apple:mac_os_x:10.2.3Apple Mac OS X 10.2.3
cpe:/a:easy_software_products:cups:1.1.6
cpe:/a:easy_software_products:cups:1.0.4_8
cpe:/a:easy_software_products:cups:1.1.12
cpe:/o:apple:mac_os_x:10.3.2Apple Mac OS X 10.3.2
cpe:/o:apple:mac_os_x:10.2.8Apple Mac OS X 10.2.8
cpe:/o:apple:mac_os_x_server:10.2.8Apple Mac OS X Server 10.2.8
cpe:/o:apple:mac_os_x_server:10.2.5Apple Mac OS X Server 10.2.5
cpe:/o:apple:mac_os_x_server:10.3.1Apple Mac OS X Server 10.3.1
cpe:/a:easy_software_products:cups:1.1.21
cpe:/o:apple:mac_os_x:10.3.4Apple Mac OS X 10.3.4
cpe:/o:apple:mac_os_x_server:10.3.2Apple Mac OS X Server 10.3.2
cpe:/a:easy_software_products:cups:1.1.17
cpe:/o:apple:mac_os_x_server:10.3Apple Mac OS X Server 10.3
cpe:/o:apple:mac_os_x:10.3.5Apple Mac OS X 10.3.5
cpe:/o:apple:mac_os_x_server:10.2.3Apple Mac OS X Server 10.2.3
cpe:/a:easy_software_products:cups:1.1.19

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0927
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0927
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-287
(官方数据源) CNNVD

- 其它链接及资源

http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html
(VENDOR_ADVISORY)  APPLE  APPLE-SA-2004-09-30
http://www.securityfocus.com/bid/11322
(UNKNOWN)  BID  11322

- 漏洞信息

Apple MacOS ServerAdmin 默认证书漏洞
中危 设计错误
2005-01-27 00:00:00 2005-10-20 00:00:00
远程  
        Apple Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        Apple Mac OS X 10.2.8至10.3.5版本中,存在信息泄露漏洞。由于上述版本中,ServerAdmin使用同样的默认的自签名证书,远程攻击者可以通过网络嗅探,对通信会话进行解密,获得敏感信息

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://support.apple.com/kb/HT1222

- 漏洞信息

10502
Apple Mac OS X ServerAdmin Default Certificate Session Decoding
Remote / Network Access Cryptographic
Loss of Confidentiality
Exploit Public

- 漏洞描述

By default, ServerAdmin installs with a default certificate. The certificate is publicly known and documented. This allows attackers to trivially access the program's communications resulting in the disclosure of arbitrary information.

- 时间线

2004-10-04 Unknow
2004-10-04 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Apple has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apple Mac OS X ServerAdmin Default SSL Certificate Vulnerability
Design Error 11344
Yes No
2004-10-06 12:00:00 2009-07-12 07:06:00
This vulnerability was reported by Michael Bartosh <mbartosh@mac.com>.

- 受影响的程序版本

Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X Server 10.2.8
Apple Mac OS X Server 10.2.7
Apple Mac OS X Server 10.2.6
Apple Mac OS X Server 10.2.5
Apple Mac OS X Server 10.2.4
Apple Mac OS X Server 10.2.3
Apple Mac OS X Server 10.2.2
Apple Mac OS X Server 10.2.1
Apple Mac OS X Server 10.2

- 漏洞讨论

It is reported that Mac OS X comes with a default private SSL certificate vulnerability.

This vulnerability allows attackers to decrypt all communications between ServerAdmin servers and clients. This facilitates the theft of authentication credentials by sniffing networks containing the affected application, and then utilizing the known private key in applications such as 'ssldump'.

Once authentication credentials are stolen, attackers can then utilize ServerAdmin for full system compromise.

Mac OS X Server 10.2.8 and 10.3.5 are reported affected by this vulnerability. Previous versions may also be affected.

This BID has been split from BID 11322 (Apple Mac OS X Multiple Security Vulnerabilities).

- 漏洞利用

An exploit is not required.

- 解决方案

Apple has released advisory APPLE-SA-2004-09-30, along with fixes to address this and other vulnerabilities. Please see the referenced advisory for further information.


Apple Mac OS X Server 10.2.8

Apple Mac OS X Server 10.3.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站