var-200505-0907
Vulnerability from variot
Mail in Mac OS X 10.3.7, when generating a Message-ID header, generates a GUUID that includes information that identifies the Ethernet hardware being used, which allows remote attackers to link mail messages to a particular machine. The Mail application supplied with Apple's Mac OS X operating system identifies the system from which any electronic mail is sent. Apple's Mac OS X operating system contains a flaw in the handling of ICC color profiles, which may allow arbitrary code execution through a heap-based buffer overflow. An information disclosure vulnerability affects the email message ID generation of Apple Mail. This issue is due to a design error that causes the application to insecurely generate email message IDs. An attacker may leverage this issue to identify the specific computer that an email has been sent from, other attacks may also be possible
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0907", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 2.4, "vendor": "apple computer", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.3.7" }, { "model": "mac os x server", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.3.7" }, { "model": "mail", "scope": null, "trust": 0.3, "vendor": "apple", "version": null }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#464662" }, { "db": "CERT/CC", "id": "VU#678150" }, { "db": "CERT/CC", "id": "VU#980078" }, { "db": "BID", "id": "12366" }, { "db": "NVD", "id": "CVE-2005-0127" }, { "db": "CNNVD", "id": "CNNVD-200505-185" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0127" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carl Purvis is credited with the discovery of this issue.", "sources": [ { "db": "BID", "id": "12366" }, { "db": "CNNVD", "id": "CNNVD-200505-185" } ], "trust": 0.9 }, "cve": "CVE-2005-0127", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-11336", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-0127", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#464662", "trust": 0.8, "value": "2.81" }, { "author": "CARNEGIE MELLON", "id": "VU#678150", "trust": 0.8, "value": "8.10" }, { "author": "CARNEGIE MELLON", "id": "VU#980078", "trust": 0.8, "value": "4.13" }, { "author": "CNNVD", "id": "CNNVD-200505-185", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-11336", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#464662" }, { "db": "CERT/CC", "id": "VU#678150" }, { "db": "CERT/CC", "id": "VU#980078" }, { "db": "VULHUB", "id": "VHN-11336" }, { "db": "NVD", "id": "CVE-2005-0127" }, { "db": "CNNVD", "id": "CNNVD-200505-185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mail in Mac OS X 10.3.7, when generating a Message-ID header, generates a GUUID that includes information that identifies the Ethernet hardware being used, which allows remote attackers to link mail messages to a particular machine. The Mail application supplied with Apple\u0027s Mac OS X operating system identifies the system from which any electronic mail is sent. Apple\u0027s Mac OS X operating system contains a flaw in the handling of ICC color profiles, which may allow arbitrary code execution through a heap-based buffer overflow. An information disclosure vulnerability affects the email message ID generation of Apple Mail. This issue is due to a design error that causes the application to insecurely generate email message IDs. \nAn attacker may leverage this issue to identify the specific computer that an email has been sent from, other attacks may also be possible", "sources": [ { "db": "NVD", "id": "CVE-2005-0127" }, { "db": "CERT/CC", "id": "VU#464662" }, { "db": "CERT/CC", "id": "VU#678150" }, { "db": "CERT/CC", "id": "VU#980078" }, { "db": "BID", "id": "12366" }, { "db": "VULHUB", "id": "VHN-11336" } ], "trust": 3.42 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "14005", "trust": 4.1 }, { "db": "CERT/CC", "id": "VU#464662", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2005-0127", "trust": 2.0 }, { "db": "SECTRACK", "id": "1013001", "trust": 1.7 }, { "db": "CERT/CC", "id": "VU#678150", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#980078", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200505-185", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2005-01-25", "trust": 0.6 }, { "db": "XF", "id": "19085", "trust": 0.6 }, { "db": "BID", "id": "12366", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-11336", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#464662" }, { "db": "CERT/CC", "id": "VU#678150" }, { "db": "CERT/CC", "id": "VU#980078" }, { "db": "VULHUB", "id": "VHN-11336" }, { "db": "BID", "id": "12366" }, { "db": "NVD", "id": "CVE-2005-0127" }, { "db": "CNNVD", "id": "CNNVD-200505-185" } ] }, "id": "VAR-200505-0907", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-11336" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T10:58:18.474000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0127" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://lists.apple.com/archives/security-announce/2005/jan/msg00001.html" }, { "trust": 2.4, "url": "http://docs.info.apple.com/article.html?artnum=300770" }, { "trust": 2.4, "url": "http://secunia.com/advisories/14005/" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/464662" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1013001" }, { "trust": 1.7, "url": "http://secunia.com/advisories/14005" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19085" }, { "trust": 0.8, "url": "http://www.immunitysec.com/resources-advisories.shtml" }, { "trust": 0.8, "url": "http://www.immunitysec.com/downloads/nukido.pdf" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/19085" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/features/mail/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#464662" }, { "db": "CERT/CC", "id": "VU#678150" }, { "db": "CERT/CC", "id": "VU#980078" }, { "db": "VULHUB", "id": "VHN-11336" }, { "db": "BID", "id": "12366" }, { "db": "NVD", "id": "CVE-2005-0127" }, { "db": "CNNVD", "id": "CNNVD-200505-185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#464662" }, { "db": "CERT/CC", "id": "VU#678150" }, { "db": "CERT/CC", "id": "VU#980078" }, { "db": "VULHUB", "id": "VHN-11336" }, { "db": "BID", "id": "12366" }, { "db": "NVD", "id": "CVE-2005-0127" }, { "db": "CNNVD", "id": "CNNVD-200505-185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-31T00:00:00", "db": "CERT/CC", "id": "VU#464662" }, { "date": "2005-01-27T00:00:00", "db": "CERT/CC", "id": "VU#678150" }, { "date": "2005-01-27T00:00:00", "db": "CERT/CC", "id": "VU#980078" }, { "date": "2005-05-02T00:00:00", "db": "VULHUB", "id": "VHN-11336" }, { "date": "2005-01-26T00:00:00", "db": "BID", "id": "12366" }, { "date": "2005-05-02T04:00:00", "db": "NVD", "id": "CVE-2005-0127" }, { "date": "2005-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-31T00:00:00", "db": "CERT/CC", "id": "VU#464662" }, { "date": "2005-01-28T00:00:00", "db": "CERT/CC", "id": "VU#678150" }, { "date": "2005-01-27T00:00:00", "db": "CERT/CC", "id": "VU#980078" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-11336" }, { "date": "2009-07-12T10:06:00", "db": "BID", "id": "12366" }, { "date": "2017-07-11T01:32:06.373000", "db": "NVD", "id": "CVE-2005-0127" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X vulnerable to information disclosure in \"Message-ID\" header", "sources": [ { "db": "CERT/CC", "id": "VU#464662" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "12366" }, { "db": "CNNVD", "id": "CNNVD-200505-185" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.