ID CVE-2013-7127
Summary Apple Safari 6.0.5 on Mac OS X 10.7.5 and 10.8.5 stores cleartext credentials in LastSession.plist, which allows local users to obtain sensitive information by reading this file.
References
Vulnerable Configurations
  • cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 29-08-2017 - 01:34)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc http://www.securelist.com/en/blog/8168/Loophole_in_Safari
xf apple-safari-cve20137127-info-disc(89941)
Last major update 29-08-2017 - 01:34
Published 17-12-2013 - 15:21
Last modified 29-08-2017 - 01:34
Back to Top