Vulnerabilities > CVE-2007-5863 - Cryptographic Issues vulnerability in Apple mac OS X and mac OS X Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Software Update in Apple Mac OS X 10.5.1 allows remote attackers to execute arbitrary commands via a man-in-the-middle (MITM) attack between the client and the server, using a modified distribution definition file with the "allow-external-scripts" option.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Exploit-Db
description | Apple OS X Software Update Command Execution. CVE-2007-5863. Remote exploit for osx platform |
id | EDB-ID:16867 |
last seen | 2016-02-02 |
modified | 2010-09-20 |
published | 2010-09-20 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16867/ |
title | Apple OS X Software Update Command Execution |
Metasploit
description | This module exploits a feature in the Distribution Packages, which are used in the Apple Software Update mechanism. This feature allows for arbitrary command execution through JavaScript. This exploit provides the malicious update server. Requests must be redirected to this server by other means for this exploit to work. |
id | MSF:EXPLOIT/OSX/BROWSER/SOFTWARE_UPDATE |
last seen | 2020-06-12 |
modified | 2017-07-24 |
published | 2007-12-18 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5863 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/osx/browser/software_update.rb |
title | Apple OS X Software Update Command Execution |
Nessus
NASL family | MacOS X Local Security Checks |
NASL id | MACOSX_SECUPD2007-009.NASL |
description | The remote host is running a version of Mac OS X 10.5 or 10.4 that does not have Security Update 2007-009 applied. This update contains several security fixes for a large number of programs. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 29723 |
published | 2007-12-18 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/29723 |
title | Mac OS X Multiple Vulnerabilities (Security Update 2007-009) |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/61889/appleupdate-exec.txt id PACKETSTORM:61889 last seen 2016-12-05 published 2007-12-18 reporter Moritz Jodeit source https://packetstormsecurity.com/files/61889/appleupdate-exec.txt.html title appleupdate-exec.txt data source https://packetstormsecurity.com/files/download/84529/software_update.rb.txt id PACKETSTORM:84529 last seen 2016-12-05 published 2009-12-31 reporter Moritz Jodeit source https://packetstormsecurity.com/files/84529/Apple-OS-X-Software-Update-Command-Execution.html title Apple OS X Software Update Command Execution
References
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://docs.info.apple.com/article.html?artnum=307179
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://www.securityfocus.com/bid/26908
- http://securitytracker.com/id?1019106
- http://secunia.com/advisories/28136
- http://www.vupen.com/english/advisories/2007/4238
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39111
- http://www.securityfocus.com/archive/1/485237/100/0/threaded