发布时间 :2005-05-04 00:00:00
修订时间 :2011-03-07 21:21:38

[原文]Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences.

[CNNVD]Apple Mac OS X AppleScript编辑器代码迷惑漏洞(CNNVD-200505-902)

        Apple Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        Apple Mac OS X对AppleScript的链接处理存在漏洞,远程攻击者可能利用此漏洞诱使用户执行恶意代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x:10.3.1Apple Mac OS X 10.3.1
cpe:/o:apple:mac_os_x:10.3.9Apple Mac OS X 10.3.9
cpe:/o:apple:mac_os_x_server:10.3.3Apple Mac OS X Server 10.3.3
cpe:/o:apple:mac_os_x_server:10.3.4Apple Mac OS X Server 10.3.4
cpe:/o:apple:mac_os_x:10.3.6Apple Mac OS X 10.3.6
cpe:/o:apple:mac_os_x:10.3.2Apple Mac OS X 10.3.2
cpe:/o:apple:mac_os_x_server:10.3.5Apple Mac OS X Server 10.3.5
cpe:/o:apple:mac_os_x:10.3.8Apple Mac OS X 10.3.8
cpe:/o:apple:mac_os_x_server:10.3.1Apple Mac OS X Server 10.3.1
cpe:/o:apple:mac_os_x:10.3.4Apple Mac OS X 10.3.4
cpe:/o:apple:mac_os_x_server:10.3.2Apple Mac OS X Server 10.3.2
cpe:/o:apple:mac_os_x:10.3.3Apple Mac OS X 10.3.3
cpe:/o:apple:mac_os_x_server:10.3Apple Mac OS X Server 10.3
cpe:/o:apple:mac_os_x:10.3.7Apple Mac OS X 10.3.7
cpe:/o:apple:mac_os_x_server:10.3.8Apple Mac OS X Server 10.3.8
cpe:/o:apple:mac_os_x:10.3.5Apple Mac OS X 10.3.5
cpe:/o:apple:mac_os_x_server:10.3.7Apple Mac OS X Server 10.3.7
cpe:/o:apple:mac_os_x:10.3Apple Mac OS X 10.3
cpe:/o:apple:mac_os_x_server:10.3.6Apple Mac OS X Server 10.3.6
cpe:/o:apple:mac_os_x_server:10.3.9Apple Mac OS X Server 10.3.9

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  BID  13480
(PATCH)  SECTRACK  1013882
(PATCH)  APPLE  APPLE-SA-2005-05-03
(UNKNOWN)  VUPEN  ADV-2005-0455

- 漏洞信息

Apple Mac OS X AppleScript编辑器代码迷惑漏洞
中危 输入验证
2005-05-04 00:00:00 2005-10-20 00:00:00
        Apple Mac OS X是一款使用在Mac机器上的操作系统,基于BSD系统。
        Apple Mac OS X对AppleScript的链接处理存在漏洞,远程攻击者可能利用此漏洞诱使用户执行恶意代码。

- 公告与补丁

        Apple Mac OS X 10.3.9:
        Apple Mac OS X Server 10.3.9:

- 漏洞信息 (F38718)

appleBad.txt (PacketStormID:F38718)
2005-07-15 00:00:00

4 security vulnerabilities surfaced for Mac OS X.

Hash: SHA1

I have published advisories for 4 security vulnerabilities in Mac OS  
X that were addressed by Apple Security Update 2005-005, released  
today. <>.

This email contains brief summaries of the problems. Full details can  
be found on my web site <>.

Description: help: URI handler execution of JavaScripts with known  
paths vulnerability
My name: DR004 <>
CVE: CAN-2005-1337 [yes, cool, isn't it ;-)]
Summary: The Help Viewer application allows JavaScript and is thus  
vulnerable to having scripts with arbitrary paths run with the  
privileges granted to file: protocol URIs. The files can be started  
with a URI on the form of help:///path/to/file.html. Combined with  
XMLHttpRequest's ability to disclose arbitrary files, this security  
bug becomes critcal.

Description: Invisible characters in applescript: URL protocol  
messaging vulnerability
My name: DR010 <>
CVE: CAN-2005-1331
Summary: URL Protocol Messaging is a technique used by Script Editor  
to facilitate sharing of AppleScripts between users. By clicking a  
link (for example in a web forum), a user can create a new Script  
Editor document automatically, with text from the query string of the  
URI. This avoids problems with copying text from the web or manually  
typing code snippets. However, the technique can be used to trick  
users into running dangerous code (with embedded control characters),  
since insufficient input validation is performed.

Description: Apple Terminal insufficient input sanitation of x-man- 
path: URIs vulnerability
My name: DR011 <>
CVE: CAN-2005-1342
Summary: Apple Terminal fails to properly sanitize the contents of x- 
man-path: URIs passed to it. This can lead to execution of arbitrary  
commands, aided by some of the escape sequences that Terminal supports.

Description: Mac OS X terminal emulators allow reading and writing of  
window title through escape sequences
My name: DR012 <>
CVE: CAN-2005-1341
Summary: Apple Terminal (often referred to as and xterm  
which both ship with current versions of Mac OS X are vulnerable to a  
well-known type of attack when displaying untrusted content. Using  
escape sequences and social engineering attacks it is in some cases  
possible to trick the user into performing arbitrary commands.

I would like to acknowledge the willingness of Apple's Product  
Security team to cooperate with me in resolving these issues. CERT's  
assistance has also been helpful.

/ Regards, David Remahl
Version: GnuPG v1.4.1 (Darwin)


- 漏洞信息

Apple Mac OS X Terminal Title Escape Sequence Arbitrary Command Injection
Local Access Required Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Mac OS X contains a flaw that may allow a malicious user to execute arbitrary commands. The issue is triggered when an escape sequence that allows titles to be read by the Terminal application is used to inject arbitrary commands into the Terminal session. It is possible that the flaw may allow arbitrary command execution resulting in a loss of integrity.

- 时间线

2005-05-03 2005-02-21
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Apple has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Apple Mac OS X Terminal Window Title Escape Sequence Command Execution Vulnerability
Input Validation Error 13503
No Yes
2005-05-03 12:00:00 2009-07-12 02:06:00
Discovery of this issue is credited to David Remahl.

- 受影响的程序版本

Apple Mac OS X Server 10.3.9
Apple Mac OS X Server 10.3.8
Apple Mac OS X Server 10.3.7
Apple Mac OS X Server 10.3.6
Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X 10.3.9
Apple Mac OS X 10.3.8
Apple Mac OS X 10.3.7
Apple Mac OS X 10.3.6
Apple Mac OS X 10.3.5
Apple Mac OS X 10.3.4
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3

- 漏洞讨论

Apple Mac OS X Terminal is reported prone to an input validation vulnerability.

Apple Terminal window title feature may be abused to execute arbitrary commands on a system running the vulnerable software.

It is possible to exploit this issue if an attacker can cause malicious escape sequences to be displayed in a terminal window of the vulnerable terminal.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

Apple has released advisory (APPLE-SA-2005-05-03) to address this and other issues. Please see the referenced advisory for more information.

Apple Mac OS X 10.3.9

Apple Mac OS X Server 10.3.9

- 相关参考