Vulnerabilities > CVE-2004-0430 - Unspecified vulnerability in Apple mac OS X and mac OS X Server

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
apple
nessus
exploit available
metasploit

Summary

Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.

Vulnerable Configurations

Part Description Count
OS
Apple
62

Exploit-Db

  • descriptionAppleFileServer LoginExt PathName Overflow. CVE-2004-0430. Remote exploit for osx platform
    idEDB-ID:16863
    last seen2016-02-02
    modified2010-09-20
    published2010-09-20
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16863/
    titleAppleFileServer LoginExt PathName Overflow
  • descriptionAppleFileServer 10.3.3 LoginEXT PathName Overflow (OS X). CVE-2004-0430. Remote exploit for osx platform
    idEDB-ID:9931
    last seen2016-02-01
    modified2004-03-03
    published2004-03-03
    reporterH D Moore
    sourcehttps://www.exploit-db.com/download/9931/
    titleAppleFileServer 10.3.3 - LoginEXT PathName Overflow OS X
  • descriptionMac OS X <= 10.3.3 AppleFileServer Remote Root Overflow Exploit. CVE-2004-0430. Remote exploit for osx platform
    idEDB-ID:391
    last seen2016-01-31
    modified2004-08-13
    published2004-08-13
    reporterDino Dai Zovi
    sourcehttps://www.exploit-db.com/download/391/
    titleMac OS X <= 10.3.3 AppleFileServer Remote Root Overflow Exploit

Metasploit

descriptionThis module exploits a stack buffer overflow in the AppleFileServer service on MacOS X. This vulnerability was originally reported by Atstake and was actually one of the few useful advisories ever published by that company. You only have one chance to exploit this bug. This particular exploit uses a stack-based return address that will only work under optimal conditions.
idMSF:EXPLOIT/OSX/AFP/LOGINEXT
last seen2020-03-11
modified2017-07-24
published2005-12-26
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0430
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/osx/afp/loginext.rb
titleAppleFileServer LoginExt PathName Overflow

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD20040503.NASL
    descriptionThe remote host is missing Security Update 2004-05-03. This security update includes updates for AFP Server, CoreFoundation, and IPSec. It also includes Security Update 2004-04-05, which includes updates for CUPS, libxml2, Mail, and OpenSSL. For Mac OS X 10.2.8, it also includes updates for Apache 1.3, cd9660.util, Classic, CUPS, Directory Services, DiskArbitration, fetchmail, fs_usage, gm4, groff, Mail, OpenSSL, Personal File Sharing, PPP, rsync, Safari, System Configuration, System Initialization, and zlib. This update fixes various issues which may allow an attacker to execute arbitrary code on the remote host.
    last seen2020-06-01
    modified2020-06-02
    plugin id12518
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12518
    titleMac OS X Multiple Vulnerabilities (Security Update 2004-05-03)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # better URL in solution, preserving old:
    #http://www.apple.com/downloads/macosx/apple/securityupdate__2004-05-03_(10_3_3_Client).html
    #http://www.apple.com/downloads/macosx/apple/securityupdate_2004-05-03_(10_2_8_Client).html
    #http://www.apple.com/downloads/macosx/apple/securityupdate_2004-05-03_(10_2_8_Server).html
    #http://www.apple.com/downloads/macosx/apple/securityupdate.html
                   
    if ( ! defined_func("bn_random") ) exit(0);
    
    include("compat.inc");
    
    if(description)
    {
     script_id(12518);
     script_version ("1.17");
     script_cve_id(
       "CVE-2004-0020",
       "CVE-2004-0113",
       "CVE-2004-0155",
       "CVE-2004-0174",
       "CVE-2004-0392",
       "CVE-2004-0403", 
       "CVE-2004-0428",
       "CVE-2004-0430"
     );
    
     script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2004-05-03)");
     script_summary(english:"Check for Security Update 2004-05-03");
     
     script_set_attribute(
       attribute:"synopsis",
       value:
    "The remote host is missing a Mac OS X update that fixes a security
    issue." );
     script_set_attribute(
       attribute:"description", 
       value:
    "The remote host is missing Security Update 2004-05-03.
    This security update includes updates for AFP Server, CoreFoundation,
    and IPSec.
    
    It also includes Security Update 2004-04-05, which includes updates
    for CUPS, libxml2, Mail, and OpenSSL.
    
    For Mac OS X 10.2.8, it also includes updates for Apache 1.3,
    cd9660.util, Classic, CUPS, Directory Services, DiskArbitration,
    fetchmail, fs_usage, gm4, groff, Mail, OpenSSL, Personal File Sharing,
    PPP, rsync, Safari, System Configuration, System Initialization, and
    zlib.
    
    This update fixes various issues which may allow an attacker to
    execute arbitrary code on the remote host." );
     script_set_attribute(
       attribute:"see_also",
       value:"http://support.apple.com/kb/HT1646"
     );
     script_set_attribute(
       attribute:"see_also",
       value:"http://lists.apple.com/archives/security-announce/2004/May/msg00000.html"
     );
     script_set_attribute(
       attribute:"solution", 
       value:"Install Security Update 2004-05-03."
     );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
     script_set_attribute(attribute:"metasploit_name", value:'AppleFileServer LoginExt PathName Overflow');
     script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/06");
     script_set_attribute(attribute:"vuln_publication_date", value: "2003/02/24");
     script_set_attribute(attribute:"patch_publication_date", value: "2004/05/03");
     script_cvs_date("Date: 2018/08/10 18:07:07");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
     script_family(english:"MacOS X Local Security Checks");
    
     script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
    
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/MacOSX/packages");
     exit(0);
    }
    
    
    packages = get_kb_item("Host/MacOSX/packages");
    if ( ! packages ) exit(0);
    
    uname = get_kb_item("Host/uname");
    os    = get_kb_item("Host/MacOSX/Version");
    if ( egrep(pattern:"Mac OS X 10\.3.* Server", string:os) ) exit(0);
    
    # MacOS X 10.2.8 and 10.3.3 only
    if ( egrep(pattern:"Darwin.* (6\.8\.|7\.3\.)", string:uname) )
    {
      if ( ! egrep(pattern:"^SecUpd2004-05-03", string:packages) ) security_hole(0);
      else {
    	set_kb_item(name:"CVE-2004-0174", value:TRUE);
    	set_kb_item(name:"CVE-2003-0020", value:TRUE);
    	set_kb_item(name:"CVE-2004-0079", value:TRUE);
    	set_kb_item(name:"CVE-2004-0081", value:TRUE);
    	set_kb_item(name:"CVE-2004-0112", value:TRUE);
    	}
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_MULTIPLE_VULNS.NASL
    descriptionThe remote host is running a version of Mac OS X that is older than 10.3.4. Such versions contain several flaws that may allow an attacker to execute arbitrary commands on the remote system with root privileges.
    last seen2020-06-01
    modified2020-06-02
    plugin id12257
    published2004-06-01
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12257
    titleMac OS X < 10.3.4 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if(description)
    {
     script_id(12257);
     script_version("1.27");
     script_cvs_date("Date: 2018/07/14  1:59:35");
    
     script_cve_id("CVE-2004-0171", "CVE-2004-0430", "CVE-2004-0485", "CVE-2004-0513", "CVE-2004-0514",
                   "CVE-2004-0515", "CVE-2004-0516", "CVE-2004-0517", "CVE-2004-0518");
     script_bugtraq_id(10268, 10271, 10432);
    
     script_name(english:"Mac OS X < 10.3.4 Multiple Vulnerabilities");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote host is missing a Mac OS X update that fixes a security
    issue." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running a version of Mac OS X that is older than
    10.3.4.  Such versions contain several flaws that may allow an
    attacker to execute arbitrary commands on the remote system with root
    privileges." );
     # nb: http://docs.info.apple.com/article.html?artnum=300667 redirects to http://support.apple.com/kb/HT1646 
     script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT1646" );
     script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2004/May/msg00005.html" );
     script_set_attribute(attribute:"solution", value:"Upgrade to Mac OS X 10.3.4 or later." );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
     script_set_attribute(attribute:"metasploit_name", value:'AppleFileServer LoginExt PathName Overflow');
     script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2004/06/01");
     script_set_attribute(attribute:"vuln_publication_date", value: "2004/05/03");
     script_set_attribute(attribute:"patch_publication_date", value: "2004/05/28");
     script_set_attribute(attribute:"plugin_type", value:"combined");
     script_end_attributes();
    
     script_summary(english:"Various flaws in MacOS X");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
     script_family(english:"MacOS X Local Security Checks");
     script_dependencies("os_fingerprint.nasl");
     script_require_keys("Host/OS");
     exit(0);
    }
    
    #
    
    # The Operating system is actually very detailed, because we can read
    # its exact version using NTP or RendezVous
    os = get_kb_item("Host/OS");
    if ( ! os || "Mac OS X" >!< os ) exit(0);
    
    if ( egrep(pattern:"Mac OS X 10\.([01]\.|3\.[0-3])", string:os) )
    	security_hole(0);
    
    

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82304/loginext.rb.txt
idPACKETSTORM:82304
last seen2016-12-05
published2009-10-28
reporterH D Moore
sourcehttps://packetstormsecurity.com/files/82304/AppleFileServer-LoginExt-PathName-Overflow.html
titleAppleFileServer LoginExt PathName Overflow