CVE-2006-1439
CVSS2.1
发布时间 :2006-05-12 17:02:00
修订时间 :2011-08-31 00:00:00
NMCOS    

[原文]NSSecureTextField in AppKit in Apple Mac OS X 10.4.6 does not re-enable secure event input under certain circumstances, which could allow other applications in the window session to monitor input characters and keyboard events.


[CNNVD]Apple Mac OS X AppKi NSSecureTextField 属于验证漏洞(CNNVD-200605-256)

        Apple Mac OS X 10.4.6 版本的AppKi的NSSecureTextField存在漏洞,其没有重新启用在某些情况下的安全事件输入,从而允许在该窗口会话的其他应用程序以监控输入字符和键盘事件。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-200 [信息暴露]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1439
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1439
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-256
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-132A.html
(UNKNOWN)  CERT  TA06-132A
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
(VENDOR_ADVISORY)  APPLE  APPLE-SA-2006-05-11
http://xforce.iss.net/xforce/xfdb/26404
(UNKNOWN)  XF  macos-appkit-nssecuretext-weak-security(26404)
http://www.vupen.com/english/advisories/2006/1779
(VENDOR_ADVISORY)  VUPEN  ADV-2006-1779
http://www.securityfocus.com/bid/17951
(UNKNOWN)  BID  17951
http://www.osvdb.org/25583
(UNKNOWN)  OSVDB  25583
http://secunia.com/advisories/20077
(VENDOR_ADVISORY)  SECUNIA  20077

- 漏洞信息

Apple Mac OS X AppKi NSSecureTextField 属于验证漏洞
低危 信息泄露
2006-05-12 00:00:00 2007-08-13 00:00:00
本地  
        Apple Mac OS X 10.4.6 版本的AppKi的NSSecureTextField存在漏洞,其没有重新启用在某些情况下的安全事件输入,从而允许在该窗口会话的其他应用程序以监控输入字符和键盘事件。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty1.pl/product=09374&cat=1&platform=osx&method=sa/mac.html

- 漏洞信息

25583
Apple Mac OS X AppKit NSSecureTextField Input Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

Mac OS X contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when switching between text input fields and NSSecureTextField may fail to re-enable secure event input, which will disclose some input character and keyboard event information resulting in a loss of confidentiality.

- 时间线

2006-05-08 Unknow
Unknow Unknow

- 解决方案

Install Apple Security Update 2006-003, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apple Mac OS X Security Update 2006-003 Multiple Vulnerabilities
Unknown 17951
Yes Yes
2006-05-11 12:00:00 2008-03-19 02:40:00
Various people are credited with the discovery of these issues, including: The vendor, Damien Bobillot, Brent Simmons of NewsGator Technologies, Inc., Tobias Hahn of HU Berlin, Ben Low of the University of New South Wales, Mike Price of McAfee AVERT Labs,

- 受影响的程序版本

Cosmicperl Directory Pro 10.0.3
Apple Safari 2.0.3
Apple Safari 2.0.2
Apple Safari 2.0.1
+ Apple Mac OS X 10.4.2
+ Apple Mac OS X 10.4.1
+ Apple Mac OS X 10.4
+ Apple Mac OS X Server 10.4.2
+ Apple Mac OS X Server 10.4.1
+ Apple Mac OS X Server 10.4
Apple Mobile Safari 0
+ Apple Mac OS X 10.4.2
+ Apple Mac OS X 10.4.2
+ Apple Mac OS X 10.4.1
+ Apple Mac OS X 10.4.1
+ Apple Mac OS X 10.4
+ Apple Mac OS X 10.4
+ Apple Mac OS X Server 10.4.2
+ Apple Mac OS X Server 10.4.1
+ Apple Mac OS X Server 10.4.1
+ Apple Mac OS X Server 10.4
+ Apple Mac OS X Server 10.4
Apple Mac OS X Server 10.5.2
Apple Mac OS X Server 10.5.1
Apple Mac OS X Server 10.4.11
Apple Mac OS X Server 10.4.10
Apple Mac OS X Server 10.4.9
Apple Mac OS X Server 10.4.8
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4
Apple Mac OS X Server 10.3.9
Apple Mac OS X Server 10.3.8
Apple Mac OS X Server 10.3.7
Apple Mac OS X Server 10.3.6
Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X Server 10.2.8
Apple Mac OS X Server 10.2.7
Apple Mac OS X Server 10.2.6
Apple Mac OS X Server 10.2.5
Apple Mac OS X Server 10.2.4
Apple Mac OS X Server 10.2.3
Apple Mac OS X Server 10.2.2
Apple Mac OS X Server 10.2.1
Apple Mac OS X Server 10.2
Apple Mac OS X Server 10.1.5
Apple Mac OS X Server 10.1.4
Apple Mac OS X Server 10.1.3
Apple Mac OS X Server 10.1.2
Apple Mac OS X Server 10.1.1
Apple Mac OS X Server 10.1
Apple Mac OS X Server 10.0
Apple Mac OS X Server 10.5
Apple Mac OS X 10.5.2
Apple Mac OS X 10.5.1
Apple Mac OS X 10.4.11
Apple Mac OS X 10.4.10
Apple Mac OS X 10.4.9
Apple Mac OS X 10.4.8
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4
Apple Mac OS X 10.3.9
Apple Mac OS X 10.3.8
Apple Mac OS X 10.3.7
Apple Mac OS X 10.3.6
Apple Mac OS X 10.3.5
Apple Mac OS X 10.3.4
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3
Apple Mac OS X 10.2.8
Apple Mac OS X 10.2.7
Apple Mac OS X 10.2.6
Apple Mac OS X 10.2.5
Apple Mac OS X 10.2.4
Apple Mac OS X 10.2.3
Apple Mac OS X 10.2.2
Apple Mac OS X 10.2.1
Apple Mac OS X 10.2
Apple Mac OS X 10.1.5
Apple Mac OS X 10.1.4
Apple Mac OS X 10.1.3
Apple Mac OS X 10.1.2
Apple Mac OS X 10.1.1
Apple Mac OS X 10.1
Apple Mac OS X 10.1
Apple Mac OS X 10.0.4
Apple Mac OS X 10.0.3
Apple Mac OS X 10.0.2
Apple Mac OS X 10.0.1
Apple Mac OS X 10.0 3
Apple Mac OS X 10.0
Apple Mac OS X 10.5

- 漏洞讨论

Apple Mac OS X is reported prone to multiple security vulnerabilities.

These issue affect Mac OS X in the following applications or modules:
- AppKit
- ImageIO
- BOM
- CFNetwork
- ClamAV
- CoreFoundation
- CoreGraphics
- Finder
- FTPServer
- Flash Player
- ImageIO
- Keychain
- LaunchServices
- libcurl
- Mail
- MySQL Manager
- Preview
- QuickDraw
- QuickTime Streaming Server
- Ruby
- Safari

A remote attacker may exploit these issues to execute arbitrary code, trigger a denial-of-service condition, gain access to potentially sensitive information, or overwrite files. Other attacks may also be possible.

Apple Mac OS X 10.4.6 and prior are reported vulnerable to these issues.

- 漏洞利用

Some of these issues do not require exploits.

- 解决方案

Apple has released an advisory along with fixes to address these issues. Please see the referenced advisory for further information.


Apple Mac OS X Server 10.3.9

Apple Mac OS X 10.3.9

Apple Mac OS X 10.4.11

Apple Mac OS X Server 10.4.11

Apple Mac OS X Server 10.4.6

Apple Mac OS X 10.5.2

Apple Mac OS X Server 10.5.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站