Vulnerabilities > CVE-2008-0050 - Information Exposure vulnerability in Apple mac OS X and mac OS X Server

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
apple
CWE-200
nessus

Summary

CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure websites via data in a 502 Bad Gateway error.

Vulnerable Configurations

Part Description Count
OS
Apple
2

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Browser Fingerprinting
    An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_SECUPD2008-002.NASL
descriptionThe remote host is running a version of Mac OS X 10.5 or 10.4 that does not have the security update 2008-002 applied. This update contains several security fixes for a number of programs.
last seen2020-06-01
modified2020-06-02
plugin id31605
published2008-03-19
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/31605
titleMac OS X Multiple Vulnerabilities (Security Update 2008-002)
code
#
# (C) Tenable Network Security, Inc.
#


if (!defined_func("bn_random")) exit(0);
if (NASL_LEVEL < 3004) exit(0);



include("compat.inc");

if (description)
{
  script_id(31605);
  script_version ("1.38");
  script_cvs_date("Date: 2018/07/14  1:59:35");

  script_cve_id("CVE-2005-3352", "CVE-2005-4077", "CVE-2006-3334", "CVE-2006-3747", "CVE-2006-5793",
                "CVE-2006-6481", "CVE-2007-0897", "CVE-2007-0898", "CVE-2007-1659", "CVE-2007-1660",
                "CVE-2007-1661", "CVE-2007-1662", "CVE-2007-1745", "CVE-2007-1997", "CVE-2007-2445",
                "CVE-2007-2799", "CVE-2007-3378", "CVE-2007-3725", "CVE-2007-3799", "CVE-2007-3847",
                "CVE-2007-4510", "CVE-2007-4560", "CVE-2007-4568", "CVE-2007-4752", "CVE-2007-4766",
                "CVE-2007-4767", "CVE-2007-4768", "CVE-2007-4887", "CVE-2007-4990", "CVE-2007-5000",
                "CVE-2007-5266", "CVE-2007-5267", "CVE-2007-5268", "CVE-2007-5269", "CVE-2007-5795",
                "CVE-2007-5901", "CVE-2007-5958", "CVE-2007-5971", "CVE-2007-6109", "CVE-2007-6203",
                "CVE-2007-6335", "CVE-2007-6336", "CVE-2007-6337", "CVE-2007-6388", "CVE-2007-6421",
                "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2008-0005", "CVE-2008-0006",
                "CVE-2008-0044", "CVE-2008-0045", "CVE-2008-0046", "CVE-2008-0047", "CVE-2008-0048",
                "CVE-2008-0049", "CVE-2008-0050", "CVE-2008-0051", "CVE-2008-0052", "CVE-2008-0053",
                "CVE-2008-0054", "CVE-2008-0055", "CVE-2008-0056", "CVE-2008-0057", "CVE-2008-0058",
                "CVE-2008-0059", "CVE-2008-0060", "CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0318",
                "CVE-2008-0596", "CVE-2008-0728", "CVE-2008-0882", "CVE-2008-0987", "CVE-2008-0988",
                "CVE-2008-0989", "CVE-2008-0990", "CVE-2008-0992", "CVE-2008-0993", "CVE-2008-0994",
                "CVE-2008-0995", "CVE-2008-0996", "CVE-2008-0997", "CVE-2008-0998", "CVE-2008-0999",
                "CVE-2008-1000");
  script_bugtraq_id(19204, 21078, 24268, 25398, 25439, 25489, 25498, 26346, 26750, 26838,
                    26927, 26946, 27234, 27236, 27751, 27988, 28278, 28303, 28304, 28307,
                    28320, 28323, 28334, 28339, 28340, 28341, 28343, 28344, 28345, 28357,
                    28358, 28359, 28363, 28364, 28365, 28367, 28368, 28371, 28371, 28372,
                    28374, 28375, 28384, 28385, 28386, 28387, 28388, 28389);

  script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2008-002)");
  script_summary(english:"Check for the presence of Security Update 2008-002");

   script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a Mac OS X update that fixes various
security issues." );
   script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X 10.5 or 10.4 that
does not have the security update 2008-002 applied. 

This update contains several security fixes for a number of programs." );
   script_set_attribute(attribute:"see_also", value:"http://docs.info.apple.com/article.html?artnum=307562" );
   script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" );
   script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/advisories/14242" );
   script_set_attribute(attribute:"solution", value:
"Install Security Update 2008-002 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'ClamAV Milter Blackhole-Mode Remote Code Execution');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
  script_set_attribute(attribute:"canvas_package", value:'CANVAS');
  script_cwe_id(20, 22, 78, 79, 94, 119, 134, 189, 200, 255, 264, 362, 399);

  script_set_attribute(attribute:"plugin_publication_date", value: "2008/03/19");
  script_set_attribute(attribute:"patch_publication_date", value: "2007/08/24");
  script_set_attribute(attribute:"vuln_publication_date", value: "2007/06/02");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");
  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/MacOSX/packages", "Host/uname");
  exit(0);
}


uname = get_kb_item("Host/uname");
if (!uname) exit(0);

if (egrep(pattern:"Darwin.* (8\.[0-9]\.|8\.1[01]\.)", string:uname))
{
  packages = get_kb_item("Host/MacOSX/packages");
  if (!packages) exit(0);

  if (!egrep(pattern:"^SecUpd(Srvr)?(2008-00[2-8]|2009-|20[1-9][0-9]-)", string:packages))
    security_hole(0);
}
else if (egrep(pattern:"Darwin.* (9\.[0-2]\.)", string:uname))
{
  packages = get_kb_item("Host/MacOSX/packages/boms");
  if (!packages) exit(0);

  if (!egrep(pattern:"^com\.apple\.pkg\.update\.security\.2008\.002\.bom", string:packages))
    security_hole(0);
}

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 28290 CVE(CAN) ID: CVE-2008-1011,CVE-2008-1010,CVE-2008-1009,CVE-2008-1008,CVE-2008-1007,CVE-2008-1006,CVE-2008-1005,CVE-2008-1004,CVE-2008-1003,CVE-2008-1002,CVE-2008-1001,CVE-2008-0050 Safari是苹果家族操作系统默认所捆绑的WEB浏览器。 Safari的3.1版修复了多个安全漏洞,具体如下: CVE-2008-0050 恶意的HTTPS代理服务器可能在502 Bad Gateway错误中向CFNetwork返回任意数据,这可能允许欺骗安全的站点。 CVE-2008-1001 Safari的错误页面中存在跨站脚本漏洞,如果用户受骗打开了恶意的URL的话,就可能导致泄露敏感信息。 CVE-2008-1002 javascript: URL处理中存在跨行脚本漏洞,如果用户受骗访问了恶意网页的话,就可能导致在其他站点的安全环境中执行JavaScript。 CVE-2008-1003 处理设置有document.domain属性的网页的方式存在漏洞,如果站点设置了document.domain属性,或在有相同document.domain的HTTP和HTTPS的网站之间,这可能导致跨站脚本攻击。 CVE-2008-1004 Web Inspector中的漏洞可能允许正在检查的页面通过注入在其他域中运行的脚本提升权限并读取用户的文件系统。 CVE-2008-1005 正常情况下网页的口令字段是隐藏的,以防泄露。Kotoeri输入法使用中的漏洞导致在请求逆向转换的时候暴露口令字段内容。 CVE-2008-1006 window.open()函数可能导致将网页的安全环境更改为调用者的安全环境。如果用户受骗访问了恶意网页的话,就可能允许在用户安全环境中执行任意脚本。 CVE-2008-1007 没有对Java applet强制帧导航策略,如果用户受骗访问了特制网页的话,就可能允许攻击者使用Java通过跨站脚本攻击获得权限提升。 CVE-2008-1008 Safari处理document.domain属性的方式存在跨站脚本漏洞,诱骗用户访问特制的网页可能导致泄露敏感信息。 CVE-2008-1009 处理历史对象时存在JavaScript注入漏洞,允许帧在同一网页所加载的所有其他帧中设置历史对象属性。攻击者可以利用这个漏洞注入可以在其他帧安全环境中运行的JavaScript,导致跨站脚本。 CVE-2008-1010 WebKit处理JavaScript正则表达式的方式存在缓冲区溢出,如果诱骗用户访问了恶意网页就会导致应用程序意外终止或执行任意代码。 CVE-2008-1011 WebKit中的跨站脚本漏洞允许在其他帧的安全环境中调用帧的方式例程。如果用户受骗访问了恶意网页的话,就会导致泄露敏感信息。 Apple Safari &lt; 3.1 Apple ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=18166&amp;cat=59&amp;platform=osx&amp;method=sa/ target=_blank>http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=18166&amp;cat=59&amp;platform=osx&amp;method=sa/</a>
idSSV:3057
last seen2017-11-19
modified2008-03-20
published2008-03-20
reporterRoot
titleApple Safari 3.1之前版本多个安全漏洞