Vulnerabilities > CVE-2004-0539 - Unspecified vulnerability in Apple mac OS X and mac OS X Server

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
apple
nessus

Summary

The "Show in Finder" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may execute downloaded applications, which could allow remote attackers to execute arbitrary code.

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_SECUPD20040607.NASL
descriptionThe remote host is missing Security Update 2004-06-07. This security update includes fixes for the following components : DiskImages LaunchServices Safari Terminal This update fixes a security problem which may allow an attacker to execute arbitrary commands the on the remote host by abusing of a flaw in Safari and the components listed above. To exploit this flaw, an attacker would need to set up a rogue web site with malformed HTML links, and lure the user of the remote host into visiting them.
last seen2020-06-01
modified2020-06-02
plugin id12520
published2004-07-06
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/12520
titleMac OS X Multiple Vulnerabilities (Security Update 2004-06-07)
code
#
# (C) Tenable Network Security, Inc.
#

if ( ! defined_func("bn_random") ) exit(0);

include("compat.inc");

if(description)
{
 script_id(12520);
 script_version ("1.20");

 script_cve_id("CVE-2004-0538", "CVE-2004-0539");
 script_bugtraq_id(10486);

 script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2004-06-07)");
 script_summary(english:"Check for Security Update 2004-06-07");
 
 script_set_attribute(
   attribute:"synopsis",
   value:
"The remote host is missing a Mac OS X update that fixes a security
issue." );
 script_set_attribute(
   attribute:"description", 
   value:
"The remote host is missing Security Update 2004-06-07.  This
security update includes fixes for the following components :

  DiskImages
  LaunchServices
  Safari
  Terminal

This update fixes a security problem which may allow an attacker
to execute arbitrary commands the on the remote host by abusing
of a flaw in Safari and the components listed above. To exploit
this flaw, an attacker would need to set up a rogue web site with
malformed HTML links, and lure the user of the remote host into
visiting them." );
 script_set_attribute(
   attribute:"see_also",
   value:"http://support.apple.com/kb/HT1646"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Install Security Update 2004-06-07."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/06");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/06/07");
 script_set_attribute(attribute:"patch_publication_date", value: "2004/05/13");
 script_cvs_date("Date: 2018/07/14  1:59:35");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"MacOS X Local Security Checks");

 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");

 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/MacOSX/packages");
 exit(0);
}

#

packages = get_kb_item("Host/MacOSX/packages");
if ( ! packages ) exit(0);

uname = get_kb_item("Host/uname");
# MacOS X 10.2.x and 10.3.x only
if ( egrep(pattern:"Darwin.* (6\.8\.|7\.4\.)", string:uname) )
{
  if ( ! egrep(pattern:"^SecUpd2004-06-07", string:packages) ) security_warning(0);
}