SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   Apple macOS/OS X Vendors:   Apple
Mac OS X Foundation Bugs Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1019649
SecurityTracker URL:  http://securitytracker.com/id/1019649
CVE Reference:   CVE-2008-0054, CVE-2008-0055, CVE-2008-0056   (Links to External Site)
Updated:  Mar 26 2008
Original Entry Date:  Mar 18 2008
Impact:   Execution of arbitrary code via local system, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.4.11 and prior versions
Description:   Several vulnerabilities were reported in Mac OS X Foundation. A local user can obtain elevated privileges on the target system.

A specially crafted selector name to the NSSelectorFromString API to trigger code execution [CVE-2008-0054].

When a target user performs a recursive file copying operation, the NSFileManager function creates directories, temporarily with world-writable privileges. A local user can modify the directories to potentially gain elevated privileges [CVE-2008-0055].

A pathname with a specially crafted structure can trigger a stack overflow in NSFileManager [CVE-2008-0056].

Mac OS X versions 10.5 and later are not affected by these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix as part of Security Update 2008-002, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

On March 26, 2008, Apple issued a revised update (Security Update 2008-002 v1.1) for Mac OS X 10.5.2 to correct a non-security reliability issue with the Aperture 'Printer Settings' button. The revised files are listed below.

For Mac OS X v10.5.2
The download file is named: "SecUpd2008-002.v1.1.dmg"
Its SHA-1 digest is: 9e50032326611245bb5382099a60cbcd4d1852c9

For Mac OS X Server v10.5.2
The download file is named: "SecUpdSrvr2008-002.v1.1.dmg"
Its SHA-1 digest is: 73f6085ab0660018635fef28df0589754f50a69a

For Mac OS X v10.4.11 (Universal)
The download file is named: "SecUpd2008-002Univ.dmg"
Its SHA-1 digest is: 49b1c6b1a919b33cbaada1c86eb501291e7145e8

For Mac OS X v10.4.11 (PPC)
The download file is named: "SecUpd2008-002PPC.dmg"
Its SHA-1 digest is: 8a838e33b6720184a4e4e13c17392892e5a06a56

For Mac OS X Server v10.4.11 (Universal)
The download file is named: "SecUpdSrvr2008-002Univ.dmg"
Its SHA-1 digest is: 77074bdd1d0574abe9631b12011f8ef1d15151b3

For Mac OS X Server v10.4.11 (PPC)
The download file is named: "SecUpdSrvr2008-002PPC.dmg"
Its SHA-1 digest is: 1b5f3c1464b1fce0d77f44e50a0b662b467e3fd0

The vendor's advisory is available at:

http://docs.info.apple.com/article.html?artnum=307562

Vendor URL:  docs.info.apple.com/article.html?artnum=307562 (Links to External Site)
Cause:   Access control error, Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC