Vulnerabilities > CVE-2007-0724 - Applications Multiple vulnerability in Apple Mac OS X

047910
CVSS 6.9 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
apple
nessus

Summary

The IOKit HID interface in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 does not sufficiently limit access to certain controls, which allows local users to gain privileges by using HID device events to read keystrokes from the console.

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2007-004.NASL
    descriptionThe remote host is running a version of Mac OS X 10.4 that does not have Security Update 2007-004 applied. This update fixes security flaws in the following applications : AFP Client AirPort CarbonCore diskdev_cmds fetchmail ftpd gnutar Help Viewer HID Family Installer Kerberos Libinfo Login Window network_cmds SMB System Configuration URLMount Video Conference WebDAV
    last seen2020-06-01
    modified2020-06-02
    plugin id25081
    published2007-04-21
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25081
    titleMac OS X Multiple Vulnerabilities (Security Update 2007-004)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    if ( ! defined_func("bn_random") ) exit(0);
    
    if (NASL_LEVEL < 3000) exit(0);
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(25081);
     script_version ("1.22");
     script_cvs_date("Date: 2018/07/14  1:59:35");
     
     script_cve_id("CVE-2006-0300", "CVE-2006-5867", "CVE-2006-6143", "CVE-2006-6652", "CVE-2007-0022",
                   "CVE-2007-0465", "CVE-2007-0646", "CVE-2007-0724", "CVE-2007-0725", "CVE-2007-0729",
                   "CVE-2007-0732", "CVE-2007-0734", "CVE-2007-0735", "CVE-2007-0736", "CVE-2007-0737",
                   "CVE-2007-0738", "CVE-2007-0739", "CVE-2007-0741", "CVE-2007-0742", "CVE-2007-0743",
                   "CVE-2007-0744", "CVE-2007-0746", "CVE-2007-0747", "CVE-2007-0957", "CVE-2007-1216");
     script_bugtraq_id(23569);
    
     script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2007-004)");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote host is missing a Mac OS X update that fixes a security
    issue." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running a version of Mac OS X 10.4 that does not have
    Security Update 2007-004 applied.
    
    This update fixes security flaws in the following applications :
    
    AFP Client
    AirPort
    CarbonCore
    diskdev_cmds
    fetchmail
    ftpd
    gnutar
    Help Viewer
    HID Family
    Installer
    Kerberos
    Libinfo
    Login Window
    network_cmds
    SMB
    System Configuration
    URLMount
    Video Conference
    WebDAV" );
     # http://web.archive.org/web/20071213053008/http://docs.info.apple.com/article.html?artnum=305391
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cf3b0926" );
     script_set_attribute(attribute:"solution", value:
    "Install Security Update 2007-004 :
    
    # http://web.archive.org/web/20070423190224/http://www.apple.com/support/downloads/securityupdate2007004universal.html
    http://www.nessus.org/u?f44d0fd9" );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_cwe_id(119, 134, 264);
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2007/04/21");
     script_set_attribute(attribute:"vuln_publication_date", value: "2007/04/09");
     script_set_attribute(attribute:"patch_publication_date", value: "2007/04/19");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
     script_end_attributes();
    
     script_summary(english:"Check for the presence of Security Update 2007-004");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
     script_family(english:"MacOS X Local Security Checks");
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/MacOSX/packages");
     exit(0);
    }
    
    #
    
    packages = get_kb_item("Host/MacOSX/packages");
    if ( ! packages ) exit(0);
    
    
    
    uname = get_kb_item("Host/uname");
    if ( egrep(pattern:"Darwin.* (7\.[0-9]\.|8\.[0-9]\.)", string:uname) )
    {
      if (!egrep(pattern:"^SecUpd(Srvr)?(2007-00[4-9]|200[89]-|20[1-9][0-9]-)", string:packages))
        security_hole(0);
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_4_9.NASL
    descriptionThe remote host is running a version of Mac OS X 10.4 which is older than version 10.4.9 or a version of Mac OS X 10.3 which does not have Security Update 2007-003 applied. This update contains several security fixes for the following programs : - ColorSync - CoreGraphics - Crash Reporter - CUPS - Disk Images - DS Plugins - Flash Player - GNU Tar - HFS - HID Family - ImageIO - Kernel - MySQL server - Networking - OpenSSH - Printing - QuickDraw Manager - servermgrd - SMB File Server - Software Update - sudo - WebLog
    last seen2020-06-01
    modified2020-06-02
    plugin id24811
    published2007-03-13
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24811
    titleMac OS X < 10.4.9 Multiple Vulnerabilities (Security Update 2007-003)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    if ( ! defined_func("bn_random") ) exit(0);
    if ( NASL_LEVEL < 3004 ) exit(0);
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(24811);
     script_version ("1.29");
    
     script_cve_id("CVE-2007-0719", "CVE-2007-0467", "CVE-2007-0720", 
                   "CVE-2007-0721", "CVE-2007-0722", "CVE-2006-6061", 
                   "CVE-2006-6062", "CVE-2006-5679", "CVE-2007-0229", 
                   "CVE-2007-0267", "CVE-2007-0299", "CVE-2007-0723", 
                   "CVE-2006-5330", "CVE-2006-0300", "CVE-2006-6097", 
                   "CVE-2007-0318", "CVE-2007-0724", "CVE-2007-1071", 
                   "CVE-2007-0733", "CVE-2006-5836", "CVE-2006-6129", 
                   "CVE-2006-6173", "CVE-2006-1516", "CVE-2006-1517", 
                   "CVE-2006-2753", "CVE-2006-3081", "CVE-2006-4031", 
                   "CVE-2006-4226", "CVE-2006-3469", "CVE-2006-6130", 
                   "CVE-2007-0236", "CVE-2007-0726", "CVE-2006-0225", 
                   "CVE-2006-4924", "CVE-2006-5051", "CVE-2006-5052", 
                   "CVE-2007-0728", "CVE-2007-0588", "CVE-2007-0730", 
                   "CVE-2007-0731", "CVE-2007-0463", "CVE-2005-2959", 
                   "CVE-2006-4829");
     script_bugtraq_id(20982, 21236, 21291, 21349, 22041, 22948);
    
     script_name(english:"Mac OS X < 10.4.9 Multiple Vulnerabilities (Security Update 2007-003)");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote host is missing a Mac OS X update which fixes a security
    issue." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running a version of Mac OS X 10.4 which is older than
    version 10.4.9 or a version of Mac OS X 10.3 which does not have 
    Security Update 2007-003 applied.
    
    This update contains several security fixes for the following programs :
    
     - ColorSync
     - CoreGraphics
     - Crash Reporter
     - CUPS
     - Disk Images
     - DS Plugins
     - Flash Player
     - GNU Tar
     - HFS
     - HID Family
     - ImageIO
     - Kernel
     - MySQL server
     - Networking
     - OpenSSH
     - Printing
     - QuickDraw Manager
     - servermgrd
     - SMB File Server
     - Software Update
     - sudo 
     - WebLog" );
     script_set_attribute(attribute:"see_also", value:"http://docs.info.apple.com/article.html?artnum=305214" );
     script_set_attribute(attribute:"solution", value:
    "Mac OS X 10.4 : Upgrade to Mac OS X 10.4.9 :
    
    http://www.apple.com/support/downloads/macosxserver1049updateppc.html
    http://www.apple.com/support/downloads/macosx1049updateintel.html
    http://www.apple.com/support/downloads/macosxserver1049updateuniversal.html
    
    Mac OS X 10.3 : Apply Security Update 2007-003 :
    
    http://www.apple.com/support/downloads/securityupdate20070031039client.html
    http://www.apple.com/support/downloads/securityupdate20070031039server.html" );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_cwe_id(79, 119, 362, 399);
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2007/03/13");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/09/28");
     script_set_attribute(attribute:"patch_publication_date", value: "2007/03/13");
     script_cvs_date("Date: 2018/07/14  1:59:35");
    script_set_attribute(attribute:"plugin_type", value:"combined");
    script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
    script_end_attributes();
    
     script_summary(english:"Check for the version of Mac OS X");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
     script_family(english:"MacOS X Local Security Checks");
     script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl");
     exit(0);
    }
    
    
    os = get_kb_item("Host/MacOSX/Version");
    if ( ! os ) {
    	 os = get_kb_item("Host/OS");
    	 confidence = get_kb_item("Host/OS/Confidence");
    	 if ( confidence <= 90 ) exit(0);
    	}
    if ( ! os ) exit(0);
    if ( ereg(pattern:"Mac OS X 10\.4($|\.[1-8]([^0-9]|$))", string:os)) security_hole(0);
    else if ( ereg(pattern:"Mac OS X 10\.3\.", string:os) )
    {
     packages = get_kb_item("Host/MacOSX/packages");
     if ( ! packages ) exit(0);
     if (!egrep(pattern:"^SecUpd(Srvr)?2007-003", string:packages)) security_hole(0);
    }