VAR-200408-0090
Vulnerability from variot - Updated: 2024-06-09 23:04The "Show in Finder" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may execute downloaded applications, which could allow remote attackers to execute arbitrary code. This could allow an attacker to execute arbitrary code. apple's Apple Mac OS X and Apple Mac OS X Server Exists in unspecified vulnerabilities.None. A security update has been released to address these issues and provide other enhancements. The following issues were reported: LaunchServices is reported prone to a vulnerability where the LaunchServices utility automatically registers applications. It is reported that an attacker may exploit this issue to register and run malicious applications. DiskImageMounter is reported prone to a vulnerability where the disk:// URI handler may be used to mount an anonymous remote file system. This attack can be achieved using the HTTP protocol. A remote attacker may exploit this vulnerability to write to the local disk. An attacker may potentially exploit this condition to automatically execute files on the file system (including downloaded files). This could lead to privilege escalation or remote compromise. Some of these issues may already be described in previous BIDs. This BID will be split up into unique BIDs when further analysis of this update is complete. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2004-06-07 Security Update 2004-06-07
Description
Security Update 2004-06-07 delivers a number of security enhancements and is recommended for all Macintosh users. The purpose of this update is to increase security by alerting you when opening an application for the first time via document mappings or a web address (URL). For more details, including a description of the new alert dialog box, please see: http://docs.info.apple.com/article.html?artnum=25785
Versions: Security Update 2004-06-07 is available for the following system versions: * Mac OS X v10.3.4 "Panther" * Mac OS X Server v10.3.4 "Panther" * Mac OS X v10.2.8 "Jaguar" * Mac OS X Server v10.2.8 "Jaguar"
The following components are updated:
Component: LaunchServices CVE-ID: CAN-2004-0538 Impact: LaunchServices automatically registers applications, which could be used to cause the system to run unexpected applications. Discussion: LaunchServices is a system component that discovers and opens applications. This system component has been modified to only open applications that have previously been explicitly run on the system. Attempts to run an application that has not previously been explicitly run will result in a user alert. Further information is available in http://docs.info.apple.com/article.html?artnum=25785
Component: DiskImageMounter CVE-ID: No CVE ID has been reserved as this is only an additional preventative measure.
Component: Terminal CVE-ID: Not applicable Impact: Attempts to use a telnet:// URI with an alternate port number fail. Discussion: A modification has been made to allow the specification of an alternate port number in a telnet:// URI. This restores functionality that was removed with the recent fix for CAN-2004-0485.
================================================
Security Update 2004-06-07 may be obtained from:
-
Software Update pane in System Preferences
-
Apple's Software Downloads web site:
For Mac OS X v10.3.4 "Panther" and Mac OS X Server v10.3.4
http://www.apple.com/support/downloads/ Click on: Security Update 2004-06-07 (10.3.4) The download file is named: "SecUpd2004-06-07Pan.dmg" Its SHA-1 digest is: 182745485d8db3ea29ec67cb603cc5668a4f60d9
For Mac OS X v10.2.8 "Jaguar" and Mac OS X Server v10.2.8
http://www.apple.com/support/downloads/ Click on: Security Update 2004-06-07 (10.2.8) The download file is named: "SecUpd2004-06-07Jag.dmg" Its SHA-1 digest is: e5fa73f6a67bdcd9af76927d3416974f039b2087
Information will also be posted to the Apple Product Security web site: http://www.apple.com/support/security/security_updates.html
This message is signed with Apple's Product Security PGP key, and details are available at: http://www.apple.com/support/security/security_pgp.html
-----BEGIN PGP SIGNATURE----- Version: PGP 8.0.2
iQEVAwUBQMTXipyw5owIz4TQAQJabgf/XdzbpuwKuBbVYQAVUl8mZd+Bs7QVdF2x sVJiNlgjyObJjTd5sjqCP9695enrEhClliNM+qOtoUcj0ed4gKIWtOBDzPuuYSb8 xjgb0ntbOg8VOoI5FX5o8dWRAmJu7SXDbnKNvpTgPfFl0Gb2spgGsX5aINGLD8iS h5SerdpJYDEMvXyAl/7Mnfz0TYH8ThWStRiEkEeaucD6Uc1yBDhUl3uV/jjHjvcp AFbaI14R/UNEypI4z0ylpH0a5tLG4CKOTAOwt68Kcs3Undbqbp8FvIUqD2Iy6fXF EtdF329mjgcaa7iDYnt2BXPvkRvthla+98flmjD9okzhM69x2t0Ubg== =JdW9 -----END PGP SIGNATURE-----
security-announce mailing list | security-announce@lists.apple.com Help/Unsubscribe/Archives: http://www.lists.apple.com/mailman/listinfo/security-announce Do not post admin requests to the list. They will be ignored
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200408-0090",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mac os x server",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.3.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.2.8"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.3.4"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.2.8"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"model": "apple mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "10.2.8"
},
{
"model": "apple mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "10.3.4"
},
{
"model": "apple mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "server 10.3.4"
},
{
"model": "apple mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "10.2.8"
},
{
"model": "apple mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "server 10.2.8"
},
{
"model": "apple mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "10.3.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.8"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#773190"
},
{
"db": "BID",
"id": "10486"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
},
{
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor disclosed these vulnerabilities.",
"sources": [
{
"db": "BID",
"id": "10486"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
}
],
"trust": 0.9
},
"cve": "CVE-2004-0539",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2004-0539",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-8969",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2004-0539",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#773190",
"trust": 0.8,
"value": "0.27"
},
{
"author": "CNNVD",
"id": "CNNVD-200408-114",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-8969",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#773190"
},
{
"db": "VULHUB",
"id": "VHN-8969"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
},
{
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The \"Show in Finder\" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may execute downloaded applications, which could allow remote attackers to execute arbitrary code. This could allow an attacker to execute arbitrary code. apple\u0027s Apple Mac OS X and Apple Mac OS X Server Exists in unspecified vulnerabilities.None. A security update has been released to address these issues and provide other enhancements. The following issues were reported:\nLaunchServices is reported prone to a vulnerability where the LaunchServices utility automatically registers applications. It is reported that an attacker may exploit this issue to register and run malicious applications. \nDiskImageMounter is reported prone to a vulnerability where the disk:// URI handler may be used to mount an anonymous remote file system. This attack can be achieved using the HTTP protocol. A remote attacker may exploit this vulnerability to write to the local disk. An attacker may potentially exploit this condition to automatically execute files on the file system (including downloaded files). This could lead to privilege escalation or remote compromise. \nSome of these issues may already be described in previous BIDs. This BID will be split up into unique BIDs when further analysis of this update is complete. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2004-06-07 Security Update 2004-06-07\n\nDescription\n\nSecurity Update 2004-06-07 delivers a number of security enhancements\nand is recommended for all Macintosh users. The purpose of this\nupdate is to increase security by alerting you when opening an\napplication for the first time via document mappings or a web address\n(URL). For more details, including a description of the new alert\ndialog box, please see:\nhttp://docs.info.apple.com/article.html?artnum=25785\n\nVersions: Security Update 2004-06-07 is available for the following\nsystem versions:\n* Mac OS X v10.3.4 \"Panther\"\n* Mac OS X Server v10.3.4 \"Panther\"\n* Mac OS X v10.2.8 \"Jaguar\"\n* Mac OS X Server v10.2.8 \"Jaguar\"\n\nThe following components are updated:\n\nComponent: LaunchServices\nCVE-ID: CAN-2004-0538\nImpact: LaunchServices automatically registers applications,\nwhich could be used to cause the system to run unexpected\napplications. \nDiscussion: LaunchServices is a system component that discovers and\nopens applications. This system component has been modified to only\nopen applications that have previously been explicitly run on the\nsystem. Attempts to run an application that has not previously been\nexplicitly run will result in a user alert. Further information is\navailable in http://docs.info.apple.com/article.html?artnum=25785\n\nComponent: DiskImageMounter\nCVE-ID: No CVE ID has been reserved as this is only an\nadditional preventative measure. \n\nComponent: Terminal\nCVE-ID: Not applicable\nImpact: Attempts to use a telnet:// URI with an alternate port\nnumber fail. \nDiscussion: A modification has been made to allow the specification\nof an alternate port number in a telnet:// URI. This restores\nfunctionality that was removed with the recent fix for CAN-2004-0485. \n\n================================================\n\nSecurity Update 2004-06-07 may be obtained from:\n\n* Software Update pane in System Preferences\n\n* Apple\u0027s Software Downloads web site:\n\nFor Mac OS X v10.3.4 \"Panther\" and Mac OS X Server v10.3.4\n==========================================================\nhttp://www.apple.com/support/downloads/\nClick on: Security Update 2004-06-07 (10.3.4)\nThe download file is named: \"SecUpd2004-06-07Pan.dmg\"\nIts SHA-1 digest is: 182745485d8db3ea29ec67cb603cc5668a4f60d9\n\nFor Mac OS X v10.2.8 \"Jaguar\" and Mac OS X Server v10.2.8\n=========================================================\nhttp://www.apple.com/support/downloads/\nClick on: Security Update 2004-06-07 (10.2.8)\nThe download file is named: \"SecUpd2004-06-07Jag.dmg\"\nIts SHA-1 digest is: e5fa73f6a67bdcd9af76927d3416974f039b2087\n\nInformation will also be posted to the Apple Product Security\nweb site:\nhttp://www.apple.com/support/security/security_updates.html\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttp://www.apple.com/support/security/security_pgp.html\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 8.0.2\n\niQEVAwUBQMTXipyw5owIz4TQAQJabgf/XdzbpuwKuBbVYQAVUl8mZd+Bs7QVdF2x\nsVJiNlgjyObJjTd5sjqCP9695enrEhClliNM+qOtoUcj0ed4gKIWtOBDzPuuYSb8\nxjgb0ntbOg8VOoI5FX5o8dWRAmJu7SXDbnKNvpTgPfFl0Gb2spgGsX5aINGLD8iS\nh5SerdpJYDEMvXyAl/7Mnfz0TYH8ThWStRiEkEeaucD6Uc1yBDhUl3uV/jjHjvcp\nAFbaI14R/UNEypI4z0ylpH0a5tLG4CKOTAOwt68Kcs3Undbqbp8FvIUqD2Iy6fXF\nEtdF329mjgcaa7iDYnt2BXPvkRvthla+98flmjD9okzhM69x2t0Ubg==\n=JdW9\n-----END PGP SIGNATURE-----\n_______________________________________________\nsecurity-announce mailing list | security-announce@lists.apple.com\nHelp/Unsubscribe/Archives: \nhttp://www.lists.apple.com/mailman/listinfo/security-announce\nDo not post admin requests to the list. They will be ignored",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0539"
},
{
"db": "CERT/CC",
"id": "VU#773190"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"db": "BID",
"id": "10486"
},
{
"db": "VULHUB",
"id": "VHN-8969"
},
{
"db": "PACKETSTORM",
"id": "33508"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2004-0539",
"trust": 3.7
},
{
"db": "CERT/CC",
"id": "VU#773190",
"trust": 3.3
},
{
"db": "OSVDB",
"id": "8432",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000921",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114",
"trust": 0.7
},
{
"db": "BID",
"id": "10486",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-8969",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "33508",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#773190"
},
{
"db": "VULHUB",
"id": "VHN-8969"
},
{
"db": "BID",
"id": "10486"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"db": "PACKETSTORM",
"id": "33508"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
},
{
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"id": "VAR-200408-0090",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-8969"
}
],
"trust": 0.01
},
"last_update_date": "2024-06-09T23:04:44.017000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "top page",
"trust": 0.8,
"url": "https://www.apple.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "others (CWE-Other) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://docs.info.apple.com/article.html?artnum=25785"
},
{
"trust": 2.5,
"url": "http://www.kb.cert.org/vuls/id/773190"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0539"
},
{
"trust": 0.8,
"url": "http://www.osvdb.org/displayvuln.php?osvdb_id=8432"
},
{
"trust": 0.3,
"url": "http://www.info.apple.com/usen/security/security_updates.html"
},
{
"trust": 0.3,
"url": "http://www.apple.com/macosx/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/security/security_updates.html"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/security/security_pgp.html"
},
{
"trust": 0.1,
"url": "http://www.lists.apple.com/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0538"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#773190"
},
{
"db": "VULHUB",
"id": "VHN-8969"
},
{
"db": "BID",
"id": "10486"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"db": "PACKETSTORM",
"id": "33508"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
},
{
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#773190"
},
{
"db": "VULHUB",
"id": "VHN-8969"
},
{
"db": "BID",
"id": "10486"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"db": "PACKETSTORM",
"id": "33508"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
},
{
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-08-24T00:00:00",
"db": "CERT/CC",
"id": "VU#773190"
},
{
"date": "2004-08-06T00:00:00",
"db": "VULHUB",
"id": "VHN-8969"
},
{
"date": "2004-06-07T00:00:00",
"db": "BID",
"id": "10486"
},
{
"date": "2024-06-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"date": "2004-06-09T05:58:22",
"db": "PACKETSTORM",
"id": "33508"
},
{
"date": "2004-08-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200408-114"
},
{
"date": "2004-08-06T04:00:00",
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-09-07T00:00:00",
"db": "CERT/CC",
"id": "VU#773190"
},
{
"date": "2017-10-12T00:00:00",
"db": "VULHUB",
"id": "VHN-8969"
},
{
"date": "2009-07-12T05:16:00",
"db": "BID",
"id": "10486"
},
{
"date": "2024-06-07T08:53:00",
"db": "JVNDB",
"id": "JVNDB-2004-000921"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200408-114"
},
{
"date": "2017-10-12T01:29:00.447000",
"db": "NVD",
"id": "CVE-2004-0539"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple Mac OS X Multiple Security Vulnerabilities",
"sources": [
{
"db": "BID",
"id": "10486"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "10486"
},
{
"db": "CNNVD",
"id": "CNNVD-200408-114"
}
],
"trust": 0.9
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.