VAR-200505-0907

Vulnerability from variot - Updated: 2023-12-18 10:58

Mail in Mac OS X 10.3.7, when generating a Message-ID header, generates a GUUID that includes information that identifies the Ethernet hardware being used, which allows remote attackers to link mail messages to a particular machine. The Mail application supplied with Apple's Mac OS X operating system identifies the system from which any electronic mail is sent. Apple's Mac OS X operating system contains a flaw in the handling of ICC color profiles, which may allow arbitrary code execution through a heap-based buffer overflow. An information disclosure vulnerability affects the email message ID generation of Apple Mail. This issue is due to a design error that causes the application to insecurely generate email message IDs. An attacker may leverage this issue to identify the specific computer that an email has been sent from, other attacks may also be possible

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0907",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 2.4,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.7"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.7"
      },
      {
        "model": "mail",
        "scope": null,
        "trust": 0.3,
        "vendor": "apple",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "db": "BID",
        "id": "12366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Carl Purvis is credited with the discovery of this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "12366"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2005-0127",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-11336",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-0127",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#464662",
            "trust": 0.8,
            "value": "2.81"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#678150",
            "trust": 0.8,
            "value": "8.10"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#980078",
            "trust": 0.8,
            "value": "4.13"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-185",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-11336",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11336"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mail in Mac OS X 10.3.7, when generating a Message-ID header, generates a GUUID that includes information that identifies the Ethernet hardware being used, which allows remote attackers to link mail messages to a particular machine. The Mail application supplied with Apple\u0027s Mac OS X operating system identifies the system from which any electronic mail is sent. Apple\u0027s Mac OS X operating system contains a flaw in the handling of ICC color profiles, which may allow arbitrary code execution through a heap-based buffer overflow. An information disclosure vulnerability affects the email message ID generation of Apple Mail.  This issue is due to a design error that causes the application to insecurely generate email message IDs. \nAn attacker may leverage this issue to identify the specific computer that an email has been sent from, other attacks may also be possible",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "db": "BID",
        "id": "12366"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11336"
      }
    ],
    "trust": 3.42
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "SECUNIA",
        "id": "14005",
        "trust": 4.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#464662",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0127",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1013001",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#678150",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#980078",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185",
        "trust": 0.7
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2005-01-25",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "19085",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "12366",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-11336",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11336"
      },
      {
        "db": "BID",
        "id": "12366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ]
  },
  "id": "VAR-200505-0907",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11336"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T10:58:18.474000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://lists.apple.com/archives/security-announce/2005/jan/msg00001.html"
      },
      {
        "trust": 2.4,
        "url": "http://docs.info.apple.com/article.html?artnum=300770"
      },
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/14005/"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/464662"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1013001"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/14005"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19085"
      },
      {
        "trust": 0.8,
        "url": "http://www.immunitysec.com/resources-advisories.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://www.immunitysec.com/downloads/nukido.pdf"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/19085"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/features/mail/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11336"
      },
      {
        "db": "BID",
        "id": "12366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11336"
      },
      {
        "db": "BID",
        "id": "12366"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-01-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "date": "2005-01-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "date": "2005-01-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11336"
      },
      {
        "date": "2005-01-26T00:00:00",
        "db": "BID",
        "id": "12366"
      },
      {
        "date": "2005-05-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-01-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#464662"
      },
      {
        "date": "2005-01-28T00:00:00",
        "db": "CERT/CC",
        "id": "VU#678150"
      },
      {
        "date": "2005-01-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#980078"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11336"
      },
      {
        "date": "2009-07-12T10:06:00",
        "db": "BID",
        "id": "12366"
      },
      {
        "date": "2017-07-11T01:32:06.373000",
        "db": "NVD",
        "id": "CVE-2005-0127"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS X vulnerable to information disclosure in \"Message-ID\" header",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#464662"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "12366"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-185"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…