var-200902-0462
Vulnerability from variot

Folder Manager in Apple Mac OS X 10.5.6 uses insecure default permissions when recreating a Downloads folder after it has been deleted, which allows local users to bypass intended access restrictions and read the Downloads folder. The security update addresses new vulnerabilities that affect the AFP server, movie playing, Resource Manager, Certificate Assistant, CoreText, 'dscl', Folder Manager, FSEvents, csregprinter, Remote Apple Event Viewer, Safari, Xterm, and SMB components of Mac OS X. The advisory also contains security updates for 32 previously reported issues. Apple Mac OS X is prone to a local information-disclosure vulnerability. A local attacker may exploit this issue to gain access to the Downloads folders of other users and potentially obtain sensitive information. This may aid in further attacks. This issue affects Mac OS X v10.5.6 and Mac OS X Server v10.5.6. NOTE: This issue was previously covered in BID 33759 (Apple Mac OS X 2009-001 Multiple Security Vulnerabilities), but has been assigned its own record to better document it.

1) A race condition error in the AFP Server can be exploited to trigger the execution of an infinite loop by sending a specially crafted file enumeration request.

2) An error in the handling of movie files using the Pixlet codec can be exploited to trigger a memory corruption.

3) An error in the Resource Manager related to CarbonCore can be exploited to trigger a memory corruption via a file containing a specially crafted resource fork.

Successful exploitation of vulnerabilities #2 and #3 may allow execution of arbitrary code.

4) Certificate Assistant handles temporary files in an insecure manner. This can be exploited to overwrite arbitrary files with the privileges of the user running the application.

5) Two errors in ClamAV can be exploited to cause a crash or potentially execute arbitrary code.

For more information: SA32663 SA32926

6) An error in CoreText when processing specially crafted Unicode strings can be exploited to cause a heap-based buffer overflow via e.g. a specially crafted web page.

Successful exploitation of this vulnerability may allow execution of arbitrary code.

7) The dscl program accepts passwords passed via command line arguments. This can be exploited by local users to obtain the received passwords via the process list.

8) Multiple errors in fetchmail can be exploited by malicious people to cause a crash via overly large e-mail headers.

10) An error in the fseventsd program can be exploited to disclose normally restricted filesystem activity via the FSEvents framework.

11) An error in perl when processing Unicode characters can be exploited to trigger a memory corruption and potentially execute arbitrary code.

This is related to: SA27546

12) An error handling problem in csregprinter can be exploited to cause a heap-based buffer overflow and potentially gain system privileges.

13) Multiple errors in python have an unknown impact or can be exploited to cause a crash or potentially compromise a vulnerable system.

For more information: SA26837 SA31305

14) An uninitialized memory access error in the Remote Apple events server can be exploited to disclose potentially sensitive memory contents via specially crafted Remote Apple events.

15) An error in Server Manager while validating authentication credentials can be exploited to alter the system configuration.

16) An integer overflow in the SMB implementation can be exploited to cause a heap-based buffer overflow by tricking a user into connecting to a malicious SMB server.

Successful exploitation of this vulnerability may allow execution of arbitrary code.

17) An error in the SMB implementation can be exploited to exhaust available memory resources and cause a system shutdown by tricking a user into connecting to a malicious SMB server.

18) An error in SquirrelMail can be exploited to inject and execute arbitrary HTML and script code via a specially crafted email.

For more information: SA30627

20) Multiple errors in FreeType can be exploited to cause a DoS or compromise an application using the library.

For more information: SA24741

22) Xterm creates TTY devices accessible to all users, when used with "luit". This can be exploited to e.g. write data to another user's Xterm.

SOLUTION: Apply Apple Security Update 2009-001. http://www.apple.com/support/downloads/

PROVIDED AND/OR DISCOVERED BY: The vendor credits: 6) Rosyna of Unsanity 9) Graham Perrin of CENTRIM, University of Brighton 10) Mark Dalrymple 12) Lars Haulin

ORIGINAL ADVISORY: http://support.apple.com/kb/HT3438

OTHER REFERENCES: SA20100: http://secunia.com/advisories/20100/

SA24741: http://secunia.com/advisories/24741/

SA24768: http://secunia.com/advisories/24768/

SA26837: http://secunia.com/advisories/26837/

SA27546: http://secunia.com/advisories/27546/

SA30600: http://secunia.com/advisories/30600/

SA30627: http://secunia.com/advisories/30627/

SA30742: http://secunia.com/advisories/30742/

SA31305: http://secunia.com/advisories/31305/

SA32143: http://secunia.com/advisories/32143/

SA32663: http://secunia.com/advisories/32663/

SA32926: http://secunia.com/advisories/32926/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200902-0462",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.6"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.6"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.6"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "33759"
      },
      {
        "db": "BID",
        "id": "33820"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Graham PerrinClint RuohoBilly Rios",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2009-0014",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2009-0014",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-37460",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-0014",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-0014",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200902-308",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-37460",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Folder Manager in Apple Mac OS X 10.5.6 uses insecure default permissions when recreating a Downloads folder after it has been deleted, which allows local users to bypass intended access restrictions and read the Downloads folder. \nThe security update addresses new vulnerabilities that affect the AFP server, movie playing, Resource Manager, Certificate Assistant, CoreText, \u0027dscl\u0027, Folder Manager, FSEvents, csregprinter, Remote Apple Event Viewer, Safari, Xterm, and SMB components of Mac OS X. The advisory also contains security updates for 32 previously reported issues. Apple Mac OS X is prone to a local information-disclosure vulnerability. \nA local attacker may exploit this issue to gain access to the Downloads folders of other users and potentially obtain sensitive information. This may aid in further attacks. \nThis issue affects Mac OS X v10.5.6 and Mac OS X Server v10.5.6. \nNOTE: This issue was previously covered in BID 33759 (Apple Mac OS X 2009-001 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. \n\n1) A race condition error in the AFP Server can be exploited to\ntrigger the execution of an infinite loop by sending a specially\ncrafted file enumeration request. \n\n2) An error in the handling of movie files using the Pixlet codec can\nbe exploited to trigger a memory corruption. \n\n3) An error in the Resource Manager related to CarbonCore can be\nexploited to trigger a memory corruption via a file containing a\nspecially crafted resource fork.  \n\nSuccessful exploitation of vulnerabilities #2 and #3 may allow\nexecution of arbitrary code. \n\n4) Certificate Assistant handles temporary files in an insecure\nmanner. This can be exploited to overwrite arbitrary files with the\nprivileges of the user running the application. \n\n5) Two errors in ClamAV can be exploited to cause a crash or\npotentially execute arbitrary code. \n\nFor more information:\nSA32663\nSA32926\n\n6) An error in CoreText when processing specially crafted Unicode\nstrings can be exploited to cause a heap-based buffer overflow via\ne.g. a specially crafted web page. \n\nSuccessful exploitation of this vulnerability may allow execution of\narbitrary code. \n\n7) The dscl program accepts passwords passed via command line\narguments. This can be exploited by local users to obtain the\nreceived passwords via the process list. \n  \n8) Multiple errors in fetchmail can be exploited by malicious people\nto cause a crash via overly large e-mail headers. \n\n10) An error in the fseventsd program can be exploited to disclose\nnormally restricted filesystem activity via the FSEvents framework. \n\n\n11) An error in perl when processing Unicode characters can be\nexploited to trigger a memory corruption and potentially execute\narbitrary code. \n\nThis is related to:\nSA27546\n\n12) An error handling problem in csregprinter can be exploited to\ncause a heap-based buffer overflow and potentially gain system\nprivileges. \n\n13) Multiple errors in python have an unknown impact or can be\nexploited to cause a crash or potentially compromise a vulnerable\nsystem. \n\nFor more information:\nSA26837\nSA31305\n\n14) An uninitialized memory access error in the Remote Apple events\nserver can be exploited to disclose potentially sensitive memory\ncontents via specially crafted Remote Apple events. \n\n15) An error in Server Manager while validating authentication\ncredentials can be exploited to alter the system configuration. \n\n16) An integer overflow in the SMB implementation can be exploited to\ncause a heap-based buffer overflow by tricking a user into connecting\nto a malicious SMB server. \n\nSuccessful exploitation of this vulnerability may allow execution of\narbitrary code. \n\n17) An error in the SMB implementation can be exploited to exhaust\navailable memory resources and cause a system shutdown by tricking a\nuser into connecting to a malicious SMB server. \n\n18) An error in SquirrelMail can be exploited to inject and execute\narbitrary HTML and script code via a specially crafted email. \n\nFor more information:\nSA30627\n\n20) Multiple errors in FreeType can be exploited to cause a DoS or\ncompromise an application using the library. \n\nFor more information:\nSA24741\n\n22) Xterm creates TTY devices accessible to all users, when used with\n\"luit\". This can be exploited to e.g. write data to another user\u0027s\nXterm. \n\nSOLUTION:\nApply Apple Security Update 2009-001. \nhttp://www.apple.com/support/downloads/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n6) Rosyna of Unsanity\n9) Graham Perrin of CENTRIM, University of Brighton\n10) Mark Dalrymple\n12) Lars Haulin\n\nORIGINAL ADVISORY:\nhttp://support.apple.com/kb/HT3438\n\nOTHER REFERENCES:\nSA20100:\nhttp://secunia.com/advisories/20100/\n\nSA24741:\nhttp://secunia.com/advisories/24741/\n\nSA24768:\nhttp://secunia.com/advisories/24768/\n\nSA26837:\nhttp://secunia.com/advisories/26837/\n\nSA27546:\nhttp://secunia.com/advisories/27546/\n\nSA30600:\nhttp://secunia.com/advisories/30600/\n\nSA30627:\nhttp://secunia.com/advisories/30627/\n\nSA30742:\nhttp://secunia.com/advisories/30742/\n\nSA31305:\nhttp://secunia.com/advisories/31305/\n\nSA32143:\nhttp://secunia.com/advisories/32143/\n\nSA32663:\nhttp://secunia.com/advisories/32663/\n\nSA32926:\nhttp://secunia.com/advisories/32926/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-0014"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "db": "BID",
        "id": "33759"
      },
      {
        "db": "BID",
        "id": "33820"
      },
      {
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "db": "PACKETSTORM",
        "id": "74951"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "33820",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0014",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "33937",
        "trust": 2.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-0422",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "33759",
        "trust": 2.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076",
        "trust": 0.8
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2009-02-12",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-37460",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "74951",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "db": "BID",
        "id": "33759"
      },
      {
        "db": "BID",
        "id": "33820"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "db": "PACKETSTORM",
        "id": "74951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "id": "VAR-200902-0462",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-37460"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:36:26.303000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HT3438",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT3438"
      },
      {
        "title": "HT3438",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT3438?viewlocale=ja_JP"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/33820"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/33937"
      },
      {
        "trust": 2.4,
        "url": "http://support.apple.com/kb/ht3438"
      },
      {
        "trust": 1.9,
        "url": "http://www.vupen.com/english/advisories/2009/0422"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2009/feb/msg00000.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/33759"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0014"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0014"
      },
      {
        "trust": 0.6,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2009/0422"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20100/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/33937/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/30742/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26837/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/32663/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/30627/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/32143/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/27546/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24768/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/31305/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24741/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/30600/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/32926/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "db": "BID",
        "id": "33759"
      },
      {
        "db": "BID",
        "id": "33820"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "db": "PACKETSTORM",
        "id": "74951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "db": "BID",
        "id": "33759"
      },
      {
        "db": "BID",
        "id": "33820"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "db": "PACKETSTORM",
        "id": "74951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "date": "2009-02-12T00:00:00",
        "db": "BID",
        "id": "33759"
      },
      {
        "date": "2009-02-12T00:00:00",
        "db": "BID",
        "id": "33820"
      },
      {
        "date": "2009-03-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "date": "2009-02-13T16:11:49",
        "db": "PACKETSTORM",
        "id": "74951"
      },
      {
        "date": "2009-02-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      },
      {
        "date": "2009-02-13T00:30:04.877000",
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-37460"
      },
      {
        "date": "2009-02-18T16:37:00",
        "db": "BID",
        "id": "33759"
      },
      {
        "date": "2009-02-18T15:57:00",
        "db": "BID",
        "id": "33820"
      },
      {
        "date": "2009-03-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      },
      {
        "date": "2009-02-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      },
      {
        "date": "2024-11-21T00:58:52.133000",
        "db": "NVD",
        "id": "CVE-2009-0014"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "33820"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS of  Folder Manager Vulnerable to reading the \"Download\" folder",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001076"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200902-308"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…