VAR-200510-0293

Vulnerability from variot - Updated: 2023-12-18 11:28

Safari after 2.0 in Apple Mac OS X 10.3.9 allows remote attackers to bypass domain restrictions via crafted web archives that cause Safari to render them as if they came from a different site. Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code. Apple Mac OS X QuickDraw Manager contains a buffer overflow that may allow a remote attacker to execute arbitrary code. Two vulnerabilities in Mail resulting in information disclosure. A local privilege escalation vulnerability in malloc. This issue has been split into BID 14939. An arbitrary code execution vulnerability in QuickDraw Manager. A privilege escalation vulnerability in QuickTime for Java. A cross-site scripting vulnerability in Safari. An unauthorized access vulnerability in SecurityAgent. A privilege escalation vulnerability in securityd. Safari is Apple's Safari web browser compatible with Microsoft Windows operating system.

1) A boundary error in ImageIO can be exploited to cause a buffer overflow and may allow execution of arbitrary code on a user's system when a specially crafted GIF file is opened e.g. in WebCore or Safari.

2) An error in Mail.app when processing auto-reply rules can cause an automatically generated response message to include a plain-text copy of the encrypted message. This may disclose certain sensitive information.

3) An error in Mail.app when using Kerberos 5 for SMTP authentication can cause un-initialized memory to be appended to a message. This may disclose certain sensitive information.

For more information: SA16449

4) "malloc" creates diagnostic files insecurely when certain environmental variables are set to enable debugging of application memory allocation. This can be exploited by malicious, local users to create or overwrite arbitrary files. from Safari, Mail, or Finder.

6) A validation error in the Java extensions bundled with QuickTime 6.52 and earlier can be exploited by untrusted applets to call arbitrary functions from system libraries. Systems with QuickTime 7 or later, or Mac OS X v10.4 or later, are not affected. Systems prior to Mac OS X v10.4 are not affected.

For more information: SA15767

8) A validation error in Safari when rendering web archives from a malicious site can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of another site.

For more information: SA16449

9) An error in the SecurityAgent may cause the "Switch User..." button to be displayed even when the "Enable fast user switching" setting has been disabled. This may allow malicious, local users to access the current user's desktop without authentication even when the "Require password to wake this computer from sleep or screen saver" setting is enabled.

10) A validation error in the Authorization Services "securityd" allows unprivileged users to gain certain privileges that should be restricted to administrative users. This can be exploited by malicious, local users to gain escalated privileges.

SOLUTION: Apply Security Update 2005-008.

Mac OS X 10.3.9: http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html

Mac OS X 10.4.2: http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html

PROVIDED AND/OR DISCOVERED BY: 2) Norbert Rittel, Rittel Consulting 3) MIT Kerberos Team 4) Ilja van Sprundel, Suresec LTD 5) Henrik Dalgaard, Echo One 6) Dino Dai Zovi 9) Luke Fowler, Indiana University Global Research Network Operations Center

ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=302413

OTHER REFERENCES: SA15767: http://secunia.com/advisories/15767/

SA16449: http://secunia.com/advisories/16449/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


.

The vulnerability is caused due to an unspecified error in the XMLRPC module, which may be exploited to execute arbitrary commands on a vulnerable XMLRPC server.

The vulnerability has been reported in version 1.8.2. Prior versions may also be affected.

SOLUTION: The vulnerability has been fixed in the CVS repository

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200510-0293",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.9"
      },
      {
        "model": "safari",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "2.0"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.9"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruby",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "db": "BID",
        "id": "14914"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-2524",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-13733",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-2524",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#684913",
            "trust": 0.8,
            "value": "9.11"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#529945",
            "trust": 0.8,
            "value": "28.69"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#650681",
            "trust": 0.8,
            "value": "24.53"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200510-203",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-13733",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "db": "VULHUB",
        "id": "VHN-13733"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Safari after 2.0 in Apple Mac OS X 10.3.9 allows remote attackers to bypass domain restrictions via crafted web archives that cause Safari to render them as if they came from a different site. Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code. Apple Mac OS X QuickDraw Manager contains a buffer overflow that may allow a remote attacker to execute arbitrary code. \nTwo vulnerabilities in Mail resulting in information disclosure. \nA local privilege escalation vulnerability in malloc. This issue has been split into BID 14939. \nAn arbitrary code execution vulnerability in QuickDraw Manager. \nA privilege escalation vulnerability in QuickTime for Java. \nA cross-site scripting vulnerability in Safari. \nAn unauthorized access vulnerability in SecurityAgent. \nA privilege escalation vulnerability in securityd. Safari is Apple\u0027s Safari web browser compatible with Microsoft Windows operating system. \n\n1) A boundary error in ImageIO can be exploited to cause a buffer\noverflow and may allow execution of arbitrary code on a user\u0027s system\nwhen a specially crafted GIF file is opened e.g. in WebCore or\nSafari. \n\n2) An error in Mail.app when processing auto-reply rules can cause an\nautomatically generated response message to include a plain-text copy\nof the encrypted message. This may disclose certain sensitive\ninformation. \n\n3) An error in Mail.app when using Kerberos 5 for SMTP authentication\ncan cause un-initialized memory to be appended to a message. This may\ndisclose certain sensitive information. \n\nFor more information:\nSA16449\n\n4) \"malloc\" creates diagnostic files insecurely when certain\nenvironmental variables are set to enable debugging of application\nmemory allocation. This can be exploited by malicious, local users to\ncreate or overwrite arbitrary files. from Safari,\nMail, or Finder. \n\n6) A validation error in the Java extensions bundled with QuickTime\n6.52 and earlier can be exploited by untrusted applets to call\narbitrary functions from system libraries. Systems with QuickTime 7\nor later, or Mac OS X v10.4 or later, are not affected. Systems prior to Mac OS X v10.4\nare not affected. \n\nFor more information:\nSA15767\n\n8) A validation error in Safari when rendering web archives from a\nmalicious site can be exploited to execute arbitrary HTML and script\ncode in a user\u0027s browser session in the context of another site. \n\nFor more information:\nSA16449\n\n9) An error in the SecurityAgent may cause the \"Switch User...\"\nbutton to be displayed even when the \"Enable fast user switching\"\nsetting has been disabled. This may allow malicious, local users to\naccess the current user\u0027s desktop without authentication even when\nthe \"Require password to wake this computer from sleep or screen\nsaver\" setting is enabled. \n\n10) A validation error in the Authorization Services \"securityd\"\nallows unprivileged users to gain certain privileges that should be\nrestricted to administrative users. This can be exploited by\nmalicious, local users to gain escalated privileges. \n\nSOLUTION:\nApply Security Update 2005-008. \n\nMac OS X 10.3.9:\nhttp://www.apple.com/support/downloads/securityupdate2005008macosx1039.html\n\nMac OS X 10.4.2:\nhttp://www.apple.com/support/downloads/securityupdate2005008macosx1042.html\n\nPROVIDED AND/OR DISCOVERED BY:\n2) Norbert Rittel, Rittel Consulting\n3) MIT Kerberos Team\n4) Ilja van Sprundel, Suresec LTD\n5) Henrik Dalgaard, Echo One\n6) Dino Dai Zovi\n9) Luke Fowler, Indiana University Global Research Network Operations\nCenter\n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=302413\n\nOTHER REFERENCES:\nSA15767:\nhttp://secunia.com/advisories/15767/\n\nSA16449:\nhttp://secunia.com/advisories/16449/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nThe vulnerability is caused due to an unspecified error in the XMLRPC\nmodule, which may be exploited to execute arbitrary commands on a\nvulnerable XMLRPC server. \n\nThe vulnerability has been reported in version 1.8.2. Prior versions\nmay also be affected. \n\nSOLUTION:\nThe vulnerability has been fixed in the CVS repository",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "db": "BID",
        "id": "14914"
      },
      {
        "db": "VULHUB",
        "id": "VHN-13733"
      },
      {
        "db": "PACKETSTORM",
        "id": "38643"
      },
      {
        "db": "PACKETSTORM",
        "id": "40227"
      },
      {
        "db": "PACKETSTORM",
        "id": "38222"
      }
    ],
    "trust": 3.69
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "AUSCERT",
        "id": "ESB-2005.0732",
        "trust": 4.1
      },
      {
        "db": "SECUNIA",
        "id": "16920",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2524",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "14914",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "15767",
        "trust": 0.9
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2005.0611",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "14016",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#684913",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "22384",
        "trust": 0.8
      },
      {
        "db": "SECTRACK",
        "id": "1014961",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#529945",
        "trust": 0.8
      },
      {
        "db": "SECTRACK",
        "id": "1014958",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "22381",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#650681",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203",
        "trust": 0.7
      },
      {
        "db": "CIAC",
        "id": "P-312",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2005-09-22",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-13733",
        "trust": 0.1
      },
      {
        "db": "SECUNIA",
        "id": "16045",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "38643",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "40227",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "38222",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "db": "VULHUB",
        "id": "VHN-13733"
      },
      {
        "db": "BID",
        "id": "14914"
      },
      {
        "db": "PACKETSTORM",
        "id": "38643"
      },
      {
        "db": "PACKETSTORM",
        "id": "40227"
      },
      {
        "db": "PACKETSTORM",
        "id": "38222"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ]
  },
  "id": "VAR-200510-0293",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-13733"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T11:28:59.479000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.1,
        "url": "http://www.auscert.org.au/5509"
      },
      {
        "trust": 3.4,
        "url": "http://secunia.com/advisories/16920/"
      },
      {
        "trust": 1.7,
        "url": "http://docs.info.apple.com/article.html?artnum=302413"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2005/sep/msg00002.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.ciac.org/ciac/bulletins/p-312.shtml"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/14914"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/15767/"
      },
      {
        "trust": 0.8,
        "url": "http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-core/5237"
      },
      {
        "trust": 0.8,
        "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315064"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/14016"
      },
      {
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2005-543.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.auscert.org.au/5356"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/documentation/carbon/reference/quickdraw_ref/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/documentation/mac/quickdraw/quickdraw-333.html#heading333-29"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2005/sep/1014961.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/22384"
      },
      {
        "trust": 0.8,
        "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33420"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2005/sep/1014958.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/22381"
      },
      {
        "trust": 0.8,
        "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33423"
      },
      {
        "trust": 0.6,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/16045/"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2005:118"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4198/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2005008macosx1039.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/16449/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2005008macosx1042.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3787/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "db": "VULHUB",
        "id": "VHN-13733"
      },
      {
        "db": "BID",
        "id": "14914"
      },
      {
        "db": "PACKETSTORM",
        "id": "38643"
      },
      {
        "db": "PACKETSTORM",
        "id": "40227"
      },
      {
        "db": "PACKETSTORM",
        "id": "38222"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "db": "VULHUB",
        "id": "VHN-13733"
      },
      {
        "db": "BID",
        "id": "14914"
      },
      {
        "db": "PACKETSTORM",
        "id": "38643"
      },
      {
        "db": "PACKETSTORM",
        "id": "40227"
      },
      {
        "db": "PACKETSTORM",
        "id": "38222"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-10-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "date": "2005-09-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "date": "2005-09-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "date": "2005-10-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-13733"
      },
      {
        "date": "2005-09-22T00:00:00",
        "db": "BID",
        "id": "14914"
      },
      {
        "date": "2005-07-14T05:31:13",
        "db": "PACKETSTORM",
        "id": "38643"
      },
      {
        "date": "2005-09-23T15:06:34",
        "db": "PACKETSTORM",
        "id": "40227"
      },
      {
        "date": "2005-06-23T07:00:38",
        "db": "PACKETSTORM",
        "id": "38222"
      },
      {
        "date": "2005-10-26T00:02:00",
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "date": "2005-10-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-10-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#684913"
      },
      {
        "date": "2005-09-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#529945"
      },
      {
        "date": "2005-09-27T00:00:00",
        "db": "CERT/CC",
        "id": "VU#650681"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-13733"
      },
      {
        "date": "2009-07-12T17:06:00",
        "db": "BID",
        "id": "14914"
      },
      {
        "date": "2008-09-05T20:51:59.237000",
        "db": "NVD",
        "id": "CVE-2005-2524"
      },
      {
        "date": "2005-10-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ruby library contains vulnerable default value",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#684913"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200510-203"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…