CVE-2011-3436 - Permissions, Privileges, and Access Control vulnerability in Apple MAC OS X and MAC OS X Server

Publication

2011-10-14

Last modification

2017-08-29

Summary

Open Directory in Apple Mac OS X 10.7 before 10.7.2 does not require a user to provide the current password before changing this password, which allows remote attackers to bypass intended password-change restrictions by leveraging an unattended workstation.

Description

Apple Mac OS X is prone to a local security-bypass vulnerability.An attacker can exploit this issue to change a user's password, aiding further attacks.NOTE: This issue was previously discussed in BID 50085 (Apple Mac OS X Prior to 10.7.2 Multiple Security Vulnerabilities) but has been given its own record to better document it.

Solution

The vendor released an update. Please see the references for details. Apple Mac OS X 10.7.1 Apple MacOSXUpd10.7.2.dmg http://www.apple.com/support/downloads/ Apple Mac OS X Server 10.7 Apple MacOSXServerUpdCombo10.7.2.dmg http://www.apple.com/support/downloads/ Apple Mac OS X Server 10.7.1 Apple MacOSXServerUpd10.7.2.dmg http://www.apple.com/support/downloads/ Apple Mac OS X 10.7 Apple MacOSXUpdCombo10.7.2.dmg http://www.apple.com/support/downloads/

Exploit

An attacker requires local interactive access to exploit the issue.

Classification

CWE-264 - Permissions, Privileges, and Access Control

Risk level (CVSS AV:N/AC:L/Au:S/C:P/I:P/A:P)

Medium

6.5

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Apple MAC OS X  10.7.0 , 10.7.1
Apple MAC OS X Server  10.7.0 , 10.7.1