发布时间 :2005-05-04 00:00:00
修订时间 :2008-09-05 16:48:52

[原文]Apple Help Viewer 2.0.7 and 3.0.0 in Mac OS X 10.3.9 allows remote attackers to read and execute arbitrary scrpts with less restrictive privileges via a help:// URI.

[CNNVD]Apple Mac OS X代码执行漏洞(CNNVD-200505-909)

        Apple Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        Apple Mac OS X的帮助浏览器在加载执行JavaScript时存在漏洞,远程攻击者可能利用此漏洞执行恶意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x:10.3.9Apple Mac OS X 10.3.9
cpe:/o:apple:mac_os_x_server:10.3.9Apple Mac OS X Server 10.3.9

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

Apple Mac OS X代码执行漏洞
高危 访问验证错误
2005-05-04 00:00:00 2005-10-20 00:00:00
        Apple Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        Apple Mac OS X的帮助浏览器在加载执行JavaScript时存在漏洞,远程攻击者可能利用此漏洞执行恶意代码。

- 公告与补丁

        Apple Mac OS X 10.3.9:
        Apple Mac OS X Server 10.3.9:

- 漏洞信息 (F38718)

appleBad.txt (PacketStormID:F38718)
2005-07-15 00:00:00

4 security vulnerabilities surfaced for Mac OS X.

Hash: SHA1

I have published advisories for 4 security vulnerabilities in Mac OS  
X that were addressed by Apple Security Update 2005-005, released  
today. <>.

This email contains brief summaries of the problems. Full details can  
be found on my web site <>.

Description: help: URI handler execution of JavaScripts with known  
paths vulnerability
My name: DR004 <>
CVE: CAN-2005-1337 [yes, cool, isn't it ;-)]
Summary: The Help Viewer application allows JavaScript and is thus  
vulnerable to having scripts with arbitrary paths run with the  
privileges granted to file: protocol URIs. The files can be started  
with a URI on the form of help:///path/to/file.html. Combined with  
XMLHttpRequest's ability to disclose arbitrary files, this security  
bug becomes critcal.

Description: Invisible characters in applescript: URL protocol  
messaging vulnerability
My name: DR010 <>
CVE: CAN-2005-1331
Summary: URL Protocol Messaging is a technique used by Script Editor  
to facilitate sharing of AppleScripts between users. By clicking a  
link (for example in a web forum), a user can create a new Script  
Editor document automatically, with text from the query string of the  
URI. This avoids problems with copying text from the web or manually  
typing code snippets. However, the technique can be used to trick  
users into running dangerous code (with embedded control characters),  
since insufficient input validation is performed.

Description: Apple Terminal insufficient input sanitation of x-man- 
path: URIs vulnerability
My name: DR011 <>
CVE: CAN-2005-1342
Summary: Apple Terminal fails to properly sanitize the contents of x- 
man-path: URIs passed to it. This can lead to execution of arbitrary  
commands, aided by some of the escape sequences that Terminal supports.

Description: Mac OS X terminal emulators allow reading and writing of  
window title through escape sequences
My name: DR012 <>
CVE: CAN-2005-1341
Summary: Apple Terminal (often referred to as and xterm  
which both ship with current versions of Mac OS X are vulnerable to a  
well-known type of attack when displaying untrusted content. Using  
escape sequences and social engineering attacks it is in some cases  
possible to trick the user into performing arbitrary commands.

I would like to acknowledge the willingness of Apple's Product  
Security team to cooperate with me in resolving these issues. CERT's  
assistance has also been helpful.

/ Regards, David Remahl
Version: GnuPG v1.4.1 (Darwin)


- 漏洞信息

Apple Mac OS X Help Viewer Javascript Arbitrary File Access
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Mac OS X contains a flaw that may allow a remote attacker to access arbitrary files. The issue is triggered when a Javascript file is executed in the Help Viewer, where it is not subject to any restrictions. It is possible that the flaw may allow a remote attacker to cause the Help Viewer to run Javascript code with the privileges of the 'file:' protocol and access arbitrary files resulting in a loss of confidentiality.

- 时间线

2005-05-03 2005-02-19
2005-05-03 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Apple has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Apple Mac OS X Help Viewer URI Handler JavaScript Code Execution Vulnerability
Access Validation Error 13496
Yes No
2005-05-03 12:00:00 2009-07-12 02:06:00
Discovered by David Remahl <>.

- 受影响的程序版本

Apple Mac OS X Server 10.3.9
Apple Mac OS X Server 10.3.8
Apple Mac OS X Server 10.3.7
Apple Mac OS X Server 10.3.6
Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X 10.3.9
Apple Mac OS X 10.3.8
Apple Mac OS X 10.3.7
Apple Mac OS X 10.3.6
Apple Mac OS X 10.3.5
Apple Mac OS X 10.3.4
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3

- 漏洞讨论

Apple Mac OS X is prone to a JavaScript execution vulnerability. This issue exists in the Help Viewer URI handler. A maliciously crafted JavaScript file loaded by the Help Viewer would be executed with local privileges.

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple Vulnerabilities). Due to the availability of more information, this issue is being assigned a new BID.

- 漏洞利用

A proof of concept exploit is available at the following location:

- 解决方案

Apple has released advisory (APPLE-SA-2005-05-03) to address this issue. Please see the referenced advisory for more information.

Apple Mac OS X 10.3.9

Apple Mac OS X Server 10.3.9

- 相关参考