Vulnerabilities > CVE-2005-2196 - Unspecified vulnerability in Apple Airport Card

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
apple
nessus

Summary

The Apple AirPort card uses a default WEP key when not connected to a known or trusted network, which can cause it to automatically connect to a malicious network.

Vulnerable Configurations

Part Description Count
Hardware
Apple
1

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_AIRPORT_42.NASL
descriptionThe remote host is running a version of Mac OS X which contains an Airport driver with an automatic network association vulnerability, that may cause a computer to connect to potentially malicious networks without notifying the end-user.
last seen2020-03-18
modified2005-07-25
plugin id19295
published2005-07-25
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/19295
titleAirport < 4.2
code
#TRUSTED 612482cd0ee2a3b266b82e1d419e6055ae44d811ce75fb3723194b125a2ce6beb3a079a0860bf40a510d51feb00c997abc2010ad39fd34c6b55bed511020877b131e8436d45c73e5d70b819f4d40aad1b05e45ab4eec4ec67716df0b45d41901743cfb29026eab943fd7d05bb0bc6a67dfe3bd80585c62d4dbf71ce27564e007a4ba6004d41775ddeb702cc4921d7b006ba7b15dc458053bd95f0e5694a730c81dfa83fc56266b807012ba881747bb5877c86e8c5674d7906af838c4f21858bb7e8240f576cef192880922cb82f7e2c89c77fa89aa94e3daa261a63e5b260f8af34bbe10d55f12583fe9a11521854108ba95f62d41352322e0062610c6888a539e9d817d5e5c32840e0d4095bab9b7b402d20ff7e489547f4259849732b71a251fe15348d6170b00483df448fbfe7f34b51be3eb92b7fc9acdb1b5e354b77bd6c9318c5912384cd7f7d72a987714a9a75baf66806fb7959edfbdaf2a4bdc6678e4ac2425531205bc29d5bb10ce076c43f24cebc72570a05ac99d70fdcc4b96e1f4aae88ff516056b0fcff6782b13b5bdd3a7a794fe2c3144c18b54867e443054aeed8006186a12320862d05fb4a287b6b2b2fa8a6a69c4e53576355c05cf12f060139a8636b0e7650aba64ad37dd4cf19f091f138e118b6df3d3e28e3c3a5071be09ddb50c97299db7a6c636645b6d1d2bf1f0bb1c55cd6b141ab621674b1e2a
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(19295);
 script_version("1.19");
 script_set_attribute(attribute:"plugin_modification_date", value: "2018/07/14");

 script_cve_id("CVE-2005-2196");
 script_bugtraq_id(14321);

 script_name(english:"Airport < 4.2");
 script_summary(english:"Check for the version of Mac OS X");

 script_set_attribute( attribute:"synopsis", value:
"The remote host is missing a Mac OS X update that fixes a security
issue.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X which contains an
Airport driver with an automatic network association vulnerability, that
may cause a computer to connect to potentially malicious networks
without notifying the end-user.");
 script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/TA23400");
 script_set_attribute(attribute:"solution", value:"Upgrade to Airport 4.2 or later.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2005/07/15");
 script_set_attribute(attribute:"patch_publication_date", value:"2005/07/19");
 script_set_attribute(attribute:"plugin_publication_date", value:"2005/07/25");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"MacOS X Local Security Checks");

 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/MacOSX/packages");
 exit(0);
}

include("misc_func.inc");
include("ssh_func.inc");
include("macosx_func.inc");


if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)
  enable_ssh_wrappers();
else disable_ssh_wrappers();

packages = get_kb_item("Host/MacOSX/packages");
if ( ! packages ) exit(0);
os = get_kb_item("Host/MacOSX/Version");
if ( ! os ) exit(0);

cmd = GetBundleVersionCmd(file:"AirPort Admin Utility.app", path:"/Applications/Utilities");

if ( !ereg(pattern:"Mac OS X 10\.(3|4\.[012]([^0-9]|$))", string:os) ) exit(0);

if ( islocalhost() )
{
 buf = pread(cmd:"/bin/bash", argv:make_list("bash", "-c", cmd));
}
else
{
 ret = ssh_open_connection();
 if ( ! ret ) exit(0);
 buf = ssh_cmd(cmd:cmd);
 ssh_close_connection();
}


if ( buf && ereg(pattern:"^([0-3]\.|4\.[01](\..*)?)", string:buf) ) security_warning(0);