CVE-2010-0039 (GCVE-0-2010-0039)
Vulnerability from cvelistv5 – Published: 2010-12-22 01:00 – Updated: 2024-08-07 00:37
VLAI?
Summary
The Application-Level Gateway (ALG) on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 modifies PORT commands in incoming FTP traffic, which allows remote attackers to use the device's IP address for arbitrary intranet TCP traffic by leveraging write access to an intranet FTP server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:37:53.172Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "APPLE-SA-2010-12-16-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4298"
},
{
"name": "1024907",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1024907"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-12-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Application-Level Gateway (ALG) on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 modifies PORT commands in incoming FTP traffic, which allows remote attackers to use the device\u0027s IP address for arbitrary intranet TCP traffic by leveraging write access to an intranet FTP server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-01-19T10:00:00",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"name": "APPLE-SA-2010-12-16-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4298"
},
{
"name": "1024907",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1024907"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2010-0039",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Application-Level Gateway (ALG) on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 modifies PORT commands in incoming FTP traffic, which allows remote attackers to use the device\u0027s IP address for arbitrary intranet TCP traffic by leveraging write access to an intranet FTP server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "APPLE-SA-2010-12-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT4298",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4298"
},
{
"name": "1024907",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024907"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2010-0039",
"datePublished": "2010-12-22T01:00:00",
"dateReserved": "2009-12-15T00:00:00",
"dateUpdated": "2024-08-07T00:37:53.172Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express_base_station_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.4.2\", \"matchCriteriaId\": \"C9226648-A35A-48C7-97B2-B641AF1AC064\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express_base_station_firmware:3.84:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BE83F1E-AE73-4EA3-BB24-00AB2CD5E5AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express_base_station_firmware:4.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDFC5591-5F55-414F-99EC-EF560F131A01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express_base_station_firmware:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9263C8C-E71C-4922-ABCD-ED71AACE2C6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express_base_station_firmware:6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64341069-B93B-48F3-946F-4248231B6AA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express_base_station_firmware:7.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"508DE2BA-DCA6-4249-B534-30EEFA2548FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express_base_station_firmware:7.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3333BFC0-037A-4926-BCBE-C0F0C1204B89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_extreme_base_station_firmware:5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3420DD2D-4B5B-4112-AE49-20FA97608495\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_extreme_base_station_firmware:5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"546C47A2-D8CE-4341-968A-051F81BAF904\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_express:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2C90704-400C-4BA2-9CF5-96C3A42B620E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:airport_extreme:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0B25975-DD1E-430F-9AB0-F363E4BF743B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:apple:time_capsule:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECA814FD-FE33-44E3-9A40-805E6C9C4ED9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Application-Level Gateway (ALG) on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 modifies PORT commands in incoming FTP traffic, which allows remote attackers to use the device\u0027s IP address for arbitrary intranet TCP traffic by leveraging write access to an intranet FTP server.\"}, {\"lang\": \"es\", \"value\": \"Application-Level Gateway (ALG) en Apple Time Capsule, AirPort Extreme Base Station, y AirPort Express Base Station con firmware anterior v7.5.2 modifica los comandos PORT en el tr\\u00e1fico FTP, lo que permite a atacantes remotos usar la direcci\\u00f3n IP del dispositivo para tr\\u00e1fico de intranet TCP de su elecci\\u00f3n aprovechando el acceso de escritura en el servidor FTP de intranet. \\r\\n\\r\\n\\r\\n\\r\\n\"}]",
"id": "CVE-2010-0039",
"lastModified": "2024-11-21T01:11:23.543",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2010-12-22T03:00:01.390",
"references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\", \"source\": \"product-security@apple.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4298\", \"source\": \"product-security@apple.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id?1024907\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4298\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id?1024907\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-0039\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2010-12-22T03:00:01.390\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Application-Level Gateway (ALG) on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 modifies PORT commands in incoming FTP traffic, which allows remote attackers to use the device\u0027s IP address for arbitrary intranet TCP traffic by leveraging write access to an intranet FTP server.\"},{\"lang\":\"es\",\"value\":\"Application-Level Gateway (ALG) en Apple Time Capsule, AirPort Extreme Base Station, y AirPort Express Base Station con firmware anterior v7.5.2 modifica los comandos PORT en el tr\u00e1fico FTP, lo que permite a atacantes remotos usar la direcci\u00f3n IP del dispositivo para tr\u00e1fico de intranet TCP de su elecci\u00f3n aprovechando el acceso de escritura en el servidor FTP de intranet. \\r\\n\\r\\n\\r\\n\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express_base_station_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.4.2\",\"matchCriteriaId\":\"C9226648-A35A-48C7-97B2-B641AF1AC064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express_base_station_firmware:3.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BE83F1E-AE73-4EA3-BB24-00AB2CD5E5AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express_base_station_firmware:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDFC5591-5F55-414F-99EC-EF560F131A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express_base_station_firmware:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9263C8C-E71C-4922-ABCD-ED71AACE2C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express_base_station_firmware:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64341069-B93B-48F3-946F-4248231B6AA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express_base_station_firmware:7.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"508DE2BA-DCA6-4249-B534-30EEFA2548FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express_base_station_firmware:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3333BFC0-037A-4926-BCBE-C0F0C1204B89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_extreme_base_station_firmware:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3420DD2D-4B5B-4112-AE49-20FA97608495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_extreme_base_station_firmware:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546C47A2-D8CE-4341-968A-051F81BAF904\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_express:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C90704-400C-4BA2-9CF5-96C3A42B620E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:airport_extreme:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B25975-DD1E-430F-9AB0-F363E4BF743B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:apple:time_capsule:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECA814FD-FE33-44E3-9A40-805E6C9C4ED9\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4298\",\"source\":\"product-security@apple.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1024907\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1024907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…