Vulnerabilities > CVE-2008-4212 - Configuration vulnerability in Apple mac OS X and mac OS X Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in rlogind in the rlogin component in Mac OS X 10.4.11 and 10.5.5 applies hosts.equiv entries to root despite what is stated in documentation, which might allow remote attackers to bypass intended access restrictions.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | MacOS X Local Security Checks |
NASL id | MACOSX_SECUPD2008-007.NASL |
description | The remote host is running a version of Mac OS X 10.5 or 10.4 that does not have the security update 2008-007 applied. This security update contains fixes for the following products : - Apache - Certificates - ClamAV - ColorSync - CUPS - Finder - launchd - libxslt - MySQL Server - Networking - PHP - Postfix - PSNormalizer - QuickLook - rlogin - Script Editor - Single Sign-On - Tomcat - vim - Weblog |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 34374 |
published | 2008-10-10 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/34374 |
title | Mac OS X Multiple Vulnerabilities (Security Update 2008-007) |
code |
|
Statements
contributor | Tomas Hoger |
lastmodified | 2008-10-25 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect the versions of rsh-server packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5. The glibcs ruserok function is used to check users authorization against rhosts files. That implementation of ruserok never opens /etc/hosts.equiv for superuser. |
References
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://secunia.com/advisories/32222
- http://secunia.com/advisories/32222
- http://support.apple.com/kb/HT3216
- http://support.apple.com/kb/HT3216
- http://www.securityfocus.com/bid/31681
- http://www.securityfocus.com/bid/31681
- http://www.securityfocus.com/bid/31708
- http://www.securityfocus.com/bid/31708
- http://www.securitytracker.com/id?1021028
- http://www.securitytracker.com/id?1021028
- http://www.vupen.com/english/advisories/2008/2780
- http://www.vupen.com/english/advisories/2008/2780
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45785
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45785