VAR-200409-0014
Vulnerability from variot - Updated: 2023-12-18 11:11Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. It is reported that a buffer overflow vulnerability is present in CoreFoundation related to its handling of an unspecified environment variable. Consequently, privileged applications using CoreFoundation may be exploited by local users to elevate their access level to that of the application. It is not known if all applications using CoreFoundation are vulnerable. Mac OS X is an operating system used on Mac machines, based on the BSD system. Apple Mac OS X CoreFoundation has library loading processing issues and buffer overflows. Local attackers can exploit this vulnerability to obtain ROOT privileges. Apple reports that local users can use the CoreFoundation CFPlugIn application to load any user-provided library to obtain ROOT privileges [CVE: CAN -2004-0821]
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200409-0014",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": null,
"scope": null,
"trust": 2.4,
"vendor": "apple computer",
"version": null
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.3.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.2.8"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.3.4"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.3.4"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.2.8"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.3.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.8"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#914870"
},
{
"db": "CERT/CC",
"id": "VU#545446"
},
{
"db": "CERT/CC",
"id": "VU#704110"
},
{
"db": "BID",
"id": "11136"
},
{
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0822"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
],
"trust": 0.6
},
"cve": "CVE-2004-0822",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-9252",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2004-0822",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#914870",
"trust": 0.8,
"value": "1.73"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#545446",
"trust": 0.8,
"value": "9.62"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#704110",
"trust": 0.8,
"value": "5.91"
},
{
"author": "CNNVD",
"id": "CNNVD-200409-015",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-9252",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#914870"
},
{
"db": "CERT/CC",
"id": "VU#545446"
},
{
"db": "CERT/CC",
"id": "VU#704110"
},
{
"db": "VULHUB",
"id": "VHN-9252"
},
{
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. It is reported that a buffer overflow vulnerability is present in CoreFoundation related to its handling of an unspecified environment variable. Consequently, privileged applications using CoreFoundation may be exploited by local users to elevate their access level to that of the application. It is not known if all applications using CoreFoundation are vulnerable. Mac OS X is an operating system used on Mac machines, based on the BSD system. Apple Mac OS X CoreFoundation has library loading processing issues and buffer overflows. Local attackers can exploit this vulnerability to obtain ROOT privileges. Apple reports that local users can use the CoreFoundation CFPlugIn application to load any user-provided library to obtain ROOT privileges [CVE: CAN -2004-0821]",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"db": "CERT/CC",
"id": "VU#914870"
},
{
"db": "CERT/CC",
"id": "VU#545446"
},
{
"db": "CERT/CC",
"id": "VU#704110"
},
{
"db": "BID",
"id": "11136"
},
{
"db": "VULHUB",
"id": "VHN-9252"
}
],
"trust": 3.42
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "SECUNIA",
"id": "12491",
"trust": 4.1
},
{
"db": "CERT/CC",
"id": "VU#545446",
"trust": 2.5
},
{
"db": "BID",
"id": "11136",
"trust": 2.0
},
{
"db": "NVD",
"id": "CVE-2004-0822",
"trust": 2.0
},
{
"db": "SECTRACK",
"id": "1011174",
"trust": 1.6
},
{
"db": "BID",
"id": "11138",
"trust": 0.8
},
{
"db": "SECTRACK",
"id": "1011176",
"trust": 0.8
},
{
"db": "CERT/CC",
"id": "VU#914870",
"trust": 0.8
},
{
"db": "CERT/CC",
"id": "VU#704110",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015",
"trust": 0.7
},
{
"db": "APPLE",
"id": "APPLE-SA-2004-09-07",
"trust": 0.6
},
{
"db": "XF",
"id": "17295",
"trust": 0.6
},
{
"db": "CIAC",
"id": "O-212",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-9252",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#914870"
},
{
"db": "CERT/CC",
"id": "VU#545446"
},
{
"db": "CERT/CC",
"id": "VU#704110"
},
{
"db": "VULHUB",
"id": "VHN-9252"
},
{
"db": "BID",
"id": "11136"
},
{
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
]
},
"id": "VAR-200409-0014",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-9252"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T11:11:51.038000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0822"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 4.1,
"url": "http://secunia.com/advisories/12491/"
},
{
"trust": 2.4,
"url": "http://docs.info.apple.com/article.html?artnum=61798"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/advisories/7148"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/11136"
},
{
"trust": 1.7,
"url": "http://www.kb.cert.org/vuls/id/545446"
},
{
"trust": 1.7,
"url": "http://www.ciac.org/ciac/bulletins/o-212.shtml"
},
{
"trust": 1.6,
"url": "http://developer.apple.com/documentation/macosx/conceptual/systemoverview/systemarchitecture/chapter_3_section_7.html"
},
{
"trust": 1.6,
"url": "http://www.securitytracker.com/alerts/2004/sep/1011174.html"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17295"
},
{
"trust": 0.8,
"url": "http://www.securitytracker.com/alerts/2004/sep/1011176.html"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/11138"
},
{
"trust": 0.8,
"url": "http://developer.apple.com/documentation/corefoundation/reference/cfpluginref/reference/introduction.html"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/17295"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#914870"
},
{
"db": "CERT/CC",
"id": "VU#545446"
},
{
"db": "CERT/CC",
"id": "VU#704110"
},
{
"db": "VULHUB",
"id": "VHN-9252"
},
{
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#914870"
},
{
"db": "CERT/CC",
"id": "VU#545446"
},
{
"db": "CERT/CC",
"id": "VU#704110"
},
{
"db": "VULHUB",
"id": "VHN-9252"
},
{
"db": "BID",
"id": "11136"
},
{
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-09-13T00:00:00",
"db": "CERT/CC",
"id": "VU#914870"
},
{
"date": "2004-09-09T00:00:00",
"db": "CERT/CC",
"id": "VU#545446"
},
{
"date": "2004-09-09T00:00:00",
"db": "CERT/CC",
"id": "VU#704110"
},
{
"date": "2004-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-9252"
},
{
"date": "2004-09-07T00:00:00",
"db": "BID",
"id": "11136"
},
{
"date": "2004-09-07T04:00:00",
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"date": "2004-09-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-09-15T00:00:00",
"db": "CERT/CC",
"id": "VU#914870"
},
{
"date": "2004-09-29T00:00:00",
"db": "CERT/CC",
"id": "VU#545446"
},
{
"date": "2004-09-09T00:00:00",
"db": "CERT/CC",
"id": "VU#704110"
},
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-9252"
},
{
"date": "2009-07-12T07:06:00",
"db": "BID",
"id": "11136"
},
{
"date": "2017-07-11T01:30:30.340000",
"db": "NVD",
"id": "CVE-2004-0822"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "11136"
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple QuickTime Streaming Server vulnerable to DoS",
"sources": [
{
"db": "CERT/CC",
"id": "VU#914870"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Boundary Condition Error",
"sources": [
{
"db": "BID",
"id": "11136"
},
{
"db": "CNNVD",
"id": "CNNVD-200409-015"
}
],
"trust": 0.9
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.