Vulnerabilities > CVE-2004-0486 - Remote Code Execution vulnerability in Apple Mac OS X Help Protocol

047910
CVSS 7.6 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
high complexity
apple
nessus
exploit available

Summary

HelpViewer in Mac OS X 10.3.3 and 10.2.8 processes scripts that it did not initiate, which can allow attackers to execute arbitrary code, an issue that was originally reported as a directory traversal vulnerability in the Safari web browser using the runscript parameter in a help: URI handler.

Exploit-Db

descriptionApple Mac OS X 10.3.x Help Protocol Remote Code Execution Vulnerability. CVE-2004-0486. Remote exploit for osx platform
idEDB-ID:24121
last seen2016-02-02
modified2004-05-17
published2004-05-17
reporterTroels Bay
sourcehttps://www.exploit-db.com/download/24121/
titleApple Mac OS X 10.3.x Help Protocol Remote Code Execution Vulnerability

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_SECUPD20040524.NASL
descriptionThe remote host is missing Security Update 2004-05-24. This security update includes fixes for the following components : HelpViewer Terminal This update fixes security issues that could allow an attacker to execute arbitrary commands on the remote host by exploiting a flaw in Safari and the components listed above. A remote attacker could exploit this flaw by tricking a user into visiting a malicious website.
last seen2020-06-01
modified2020-06-02
plugin id12519
published2004-07-06
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/12519
titleMac OS X Multiple Vulnerabilities (Security Update 2004-05-24)
code
#
# (C) Tenable Network Security, Inc.
#

# URLs dead
#"macosx_SecUpd20040503.nasl"
#http://www.apple.com/downloads/macosx/apple/securityupdate__2004-05-24_(10_3_3).html
#http://www.apple.com/downloads/macosx/apple/securityupdate_2004-05-24_(10_2_8).html

if ( ! defined_func("bn_random") ) exit(0);

include("compat.inc");

if(description)
{
 script_id(12519);
 script_version ("1.13");
 script_cve_id("CVE-2004-0485", "CVE-2004-0486");

 script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2004-05-24)");
 script_summary(english:"Check for Security Update 2004-05-24");
 
 script_set_attribute(
   attribute:"synopsis",
   value:
"The remote host is missing a Mac OS X update that fixes a security
issue." );
 script_set_attribute(
   attribute:"description", 
   value:
"The remote host is missing Security Update 2004-05-24.  This security
update includes fixes for the following components :

  HelpViewer
  Terminal

This update fixes security issues that could allow an attacker to
execute arbitrary commands on the remote host by exploiting a flaw
in Safari and the components listed above.  A remote attacker could
exploit this flaw by tricking a user into visiting a malicious website." );
 # http://web.archive.org/web/20080915104713/http://support.apple.com/kb/HT1646?
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?210abeb5"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Install Security Update 2004-05-24."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/06");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/05/14");
 script_set_attribute(attribute:"patch_publication_date", value: "2004/05/21");
 script_cvs_date("Date: 2018/08/10 18:07:07");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"MacOS X Local Security Checks");

 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");

 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/MacOSX/packages");
 exit(0);
}


packages = get_kb_item("Host/MacOSX/packages");
if ( ! packages ) exit(0);

uname = get_kb_item("Host/uname");
# MacOS X 10.2.8 and 10.3.3 only
if ( egrep(pattern:"Darwin.* (6\.8\.|7\.3\.)", string:uname) )
{
  if ( ! egrep(pattern:"^SecUpd2004-05-24", string:packages) ) security_warning(0);
}