CVE-2006-1471
CVSS4.6
发布时间 :2006-06-27 18:13:00
修订时间 :2011-03-07 00:00:00
NMCOS    

[原文]Format string vulnerability in the CF_syslog function launchd in Apple Mac OS X 10.4 up to 10.4.6 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a syslog call in the logging facility, as demonstrated by using a crafted plist file.


[CNNVD]Apple Mac OS X CF_syslog函数 格式串漏洞(CNNVD-200606-527)

        Apple Mac OS X是苹果家族机器所使用的操作系统。
        setuid程序launchd中的格式串漏洞可能允许本地用户以系统权限执行任意代码。漏洞具体存在于launchd的日志工具中。
        
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-134 []

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x_server:10.4.5Apple Mac OS X Server 10.4.5
cpe:/o:apple:mac_os_x_server:10.4.1Apple Mac OS X Server 10.4.1
cpe:/o:apple:mac_os_x:10.4.2Apple Mac OS X 10.4.2
cpe:/o:apple:mac_os_x:10.4Apple Mac OS X 10.4
cpe:/o:apple:mac_os_x_server:10.4.3Apple Mac OS X Server 10.4.3
cpe:/o:apple:mac_os_x_server:10.4Apple Mac OS X Server 10.4
cpe:/o:apple:mac_os_x:10.4.6Apple Mac OS X 10.4.6
cpe:/o:apple:mac_os_x_server:10.4.2Apple Mac OS X Server 10.4.2
cpe:/o:apple:mac_os_x_server:10.4.4Apple Mac OS X Server 10.4.4
cpe:/o:apple:mac_os_x:10.4.3Apple Mac OS X 10.4.3
cpe:/o:apple:mac_os_x:10.4.1Apple Mac OS X 10.4.1
cpe:/o:apple:mac_os_x_server:10.4.6Apple Mac OS X Server 10.4.6
cpe:/o:apple:mac_os_x:10.4.5Apple Mac OS X 10.4.5
cpe:/o:apple:mac_os_x:10.4.4Apple Mac OS X 10.4.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1471
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1471
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-527
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/27479
(UNKNOWN)  XF  macosx-launchd-format-string(27479)
http://www.vupen.com/english/advisories/2006/2566
(VENDOR_ADVISORY)  VUPEN  ADV-2006-2566
http://www.securityfocus.com/bid/18724
(UNKNOWN)  BID  18724
http://www.securityfocus.com/bid/18686
(UNKNOWN)  BID  18686
http://www.securityfocus.com/archive/1/archive/1/438699/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060629 DMA[2006-0628a] - 'Apple OSX launchd unformatted syslog() vulnerability'
http://www.osvdb.org/26933
(UNKNOWN)  OSVDB  26933
http://securitytracker.com/id?1016397
(UNKNOWN)  SECTRACK  1016397
http://secunia.com/advisories/20877
(VENDOR_ADVISORY)  SECUNIA  20877
http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html
(UNKNOWN)  APPLE  APPLE-SA-2006-06-27

- 漏洞信息

Apple Mac OS X CF_syslog函数 格式串漏洞
中危 格式化字符串
2006-06-27 00:00:00 2006-07-03 00:00:00
本地  
        Apple Mac OS X是苹果家族机器所使用的操作系统。
        setuid程序launchd中的格式串漏洞可能允许本地用户以系统权限执行任意代码。漏洞具体存在于launchd的日志工具中。
        
        

- 公告与补丁

        暂无数据

- 漏洞信息

26933
Apple Mac OS X CF_syslog Function Format String
Local Access Required, Local / Remote, Context Dependent Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Mac OS X contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when the CF_syslog() function passes unchecked data to syslog(), allowing for a possible format string exploit. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

- 时间线

2006-06-26 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 10.4.7 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Apple Mac OS X LaunchD Local Format String Vulnerability
Input Validation Error 18724
No Yes
2006-06-29 12:00:00 2006-07-04 07:04:00
Kevin Finisterre of DigitalMunition is credited with the discovery of this vulnerability.

- 受影响的程序版本

Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4
Apple Mac OS X Server 10.4.7
Apple Mac OS X 10.4.7

- 不受影响的程序版本

Apple Mac OS X Server 10.4.7
Apple Mac OS X 10.4.7

- 漏洞讨论

Apple Mac OS X 'launchd' is prone to a local format-string vulnerability. A local attacker can exploit this issue through a malicious 'plist' file that includes externally supplied format specifiers that will be passed to the vulnerable code.

A successful attack may crash the application or lead to arbitrary code execution.

This issue was initially discussed in BID 18686 (Apple Mac OS X Multiple Security Vulnerabilities).

- 漏洞利用

The following exploits are available:

- 解决方案

The vendor has released Mac OS X version 10.4.7 to address this and other issues.

Please see the referenced vendor advisories for more information.


Apple Mac OS X Server 10.4

Apple Mac OS X 10.4

Apple Mac OS X Server 10.4.1

Apple Mac OS X 10.4.1

Apple Mac OS X 10.4.2

Apple Mac OS X Server 10.4.2

Apple Mac OS X 10.4.3

Apple Mac OS X Server 10.4.3

Apple Mac OS X Server 10.4.4

Apple Mac OS X 10.4.4

Apple Mac OS X Server 10.4.5

Apple Mac OS X 10.4.5

Apple Mac OS X Server 10.4.6

Apple Mac OS X 10.4.6

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站