var-201006-0228
Vulnerability from variot
NetAuthSysAgent in Network Authorization in Apple Mac OS X 10.5.8 does not have the expected authorization requirements, which allows local users to gain privileges via unspecified vectors. Successful exploits can allow attackers to execute arbitrary code with superuser privileges, resulting in the complete compromise of the affected computer. The update addresses new vulnerabilities that affect the CUPS, DesktopServices, Folder Manager, Help Viewer, iChat, ImageIO, Network Authorization, Open Directory, Printer Setup, Printing, Ruby, SMB File Server, and Wiki Server components of Mac OS X. The advisory also contains security updates for 13 previously reported issues. This BID is being retired
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201006-0228", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.8" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.5.8" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.8" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" } ], "sources": [ { "db": "BID", "id": "40901" }, { "db": "BID", "id": "40871" }, { "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "db": "CNNVD", "id": "CNNVD-201006-287" }, { "db": "NVD", "id": "CVE-2010-1375" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001655" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple; Adrian \u0027pagvac\u0027 Pastor of GNUCITIZEN, and Tim Starling; Tim Waugh; Luca Carettoni; Michi Ruepp of pianobakery.com; Clint Ruoho of Laconic Security; Kevin Finisterre of digitalmunition.com; MIT Kerberos Team; Joel Johnson, Debian, Brian Almeida; Emm", "sources": [ { "db": "CNNVD", "id": "CNNVD-201006-287" } ], "trust": 0.6 }, "cve": "CVE-2010-1375", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2010-1375", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-43980", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-1375", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2010-1375", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201006-287", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-43980", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2010-1375", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-43980" }, { "db": "VULMON", "id": "CVE-2010-1375" }, { "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "db": "CNNVD", "id": "CNNVD-201006-287" }, { "db": "NVD", "id": "CVE-2010-1375" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NetAuthSysAgent in Network Authorization in Apple Mac OS X 10.5.8 does not have the expected authorization requirements, which allows local users to gain privileges via unspecified vectors. \nSuccessful exploits can allow attackers to execute arbitrary code with superuser privileges, resulting in the complete compromise of the affected computer. \nThe update addresses new vulnerabilities that affect the CUPS, DesktopServices, Folder Manager, Help Viewer, iChat, ImageIO, Network Authorization, Open Directory, Printer Setup, Printing, Ruby, SMB File Server, and Wiki Server components of Mac OS X. The advisory also contains security updates for 13 previously reported issues. \nThis BID is being retired", "sources": [ { "db": "NVD", "id": "CVE-2010-1375" }, { "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "db": "BID", "id": "40901" }, { "db": "BID", "id": "40871" }, { "db": "VULHUB", "id": "VHN-43980" }, { "db": "VULMON", "id": "CVE-2010-1375" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-1375", "trust": 2.9 }, { "db": "SECUNIA", "id": "40220", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2010-1481", "trust": 2.5 }, { "db": "SECTRACK", "id": "1024103", "trust": 2.5 }, { "db": "BID", "id": "40871", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2010-001655", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201006-287", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2010-06-15-1", "trust": 0.6 }, { "db": "BID", "id": "40901", "trust": 0.5 }, { "db": "VULHUB", "id": "VHN-43980", "trust": 0.1 }, { "db": "VUPEN", "id": "2010/1481", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2010-1375", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-43980" }, { "db": "VULMON", "id": "CVE-2010-1375" }, { "db": "BID", "id": "40901" }, { "db": "BID", "id": "40871" }, { "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "db": "CNNVD", "id": "CNNVD-201006-287" }, { "db": "NVD", "id": "CVE-2010-1375" } ] }, "id": "VAR-201006-0228", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-43980" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:43:20.369000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4188", "trust": 0.8, "url": "http://support.apple.com/kb/HT4188" }, { "title": "HT4188", "trust": 0.8, "url": "http://support.apple.com/kb/HT4188?viewlocale=ja_JP" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001655" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-43980" }, { "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "db": "NVD", "id": "CVE-2010-1375" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://securitytracker.com/id?1024103" }, { "trust": 2.6, "url": "http://secunia.com/advisories/40220" }, { "trust": 2.6, "url": "http://www.vupen.com/english/advisories/2010/1481" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2010//jun/msg00001.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/40871" }, { "trust": 1.8, "url": "http://support.apple.com/kb/ht4188" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1375" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1375" }, { "trust": 0.6, "url": "http://www.apple.com/macosx/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/40901" } ], "sources": [ { "db": "VULHUB", "id": "VHN-43980" }, { "db": "VULMON", "id": "CVE-2010-1375" }, { "db": "BID", "id": "40901" }, { "db": "BID", "id": "40871" }, { "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "db": "CNNVD", "id": "CNNVD-201006-287" }, { "db": "NVD", "id": "CVE-2010-1375" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-43980" }, { "db": "VULMON", "id": "CVE-2010-1375" }, { "db": "BID", "id": "40901" }, { "db": "BID", "id": "40871" }, { "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "db": "CNNVD", "id": "CNNVD-201006-287" }, { "db": "NVD", "id": "CVE-2010-1375" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-06-17T00:00:00", "db": "VULHUB", "id": "VHN-43980" }, { "date": "2010-06-17T00:00:00", "db": "VULMON", "id": "CVE-2010-1375" }, { "date": "2010-06-15T00:00:00", "db": "BID", "id": "40901" }, { "date": "2010-06-15T00:00:00", "db": "BID", "id": "40871" }, { "date": "2010-07-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "date": "2010-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-287" }, { "date": "2010-06-17T16:30:01.577000", "db": "NVD", "id": "CVE-2010-1375" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-06-18T00:00:00", "db": "VULHUB", "id": "VHN-43980" }, { "date": "2010-06-18T00:00:00", "db": "VULMON", "id": "CVE-2010-1375" }, { "date": "2010-06-15T00:00:00", "db": "BID", "id": "40901" }, { "date": "2010-06-16T21:59:00", "db": "BID", "id": "40871" }, { "date": "2010-07-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001655" }, { "date": "2010-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-287" }, { "date": "2024-11-21T01:14:16.630000", "db": "NVD", "id": "CVE-2010-1375" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "40901" }, { "db": "CNNVD", "id": "CNNVD-201006-287" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X Vulnerability that can be obtained authority in network authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001655" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201006-287" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…