Vulnerabilities > Apple > MAC OS X Server > 10.3.7

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0127 Unspecified vulnerability in Apple mac OS X and mac OS X Server
Mail in Mac OS X 10.3.7, when generating a Message-ID header, generates a GUUID that includes information that identifies the Ethernet hardware being used, which allows remote attackers to link mail messages to a particular machine.
network
low complexity
apple
5.0
2005-05-02 CVE-2005-0126 Remote Buffer Overflow vulnerability in Apple ColorSync ICC Header
ColorSync on Mac OS X 10.3.7 and 10.3.8 allows attackers to execute arbitrary code via malformed ICC color profiles that modify the heap.
network
low complexity
apple
7.5
2005-03-21 CVE-2005-0715 Unspecified vulnerability in Apple mac OS X and mac OS X Server
AFP Server in Mac OS X before 10.3.8 uses insecure permissions for "Drop Boxes," which allows local users to read the contents of a Drop Box.
local
low complexity
apple
2.1
2005-03-21 CVE-2005-0713 Unspecified vulnerability in Apple mac OS X and mac OS X Server
The Bluetooth Setup Assistant for Mac OS X before 10.3.8 can be launched without a keyboard or Bluetooth device, which allows local users to bypass access restrictions and gain privileges.
local
low complexity
apple
4.6
2004-12-21 CVE-2004-1307 Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow. 7.5
2004-10-07 CVE-2005-0373 Remote And Local vulnerability in Cyrus SASL
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
network
low complexity
cyrus openpkg suse conectiva apple redhat
7.5
2002-12-18 CVE-2002-1347 Incorrect Calculation of Buffer Size vulnerability in multiple products
Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.
network
low complexity
cyrusimap apple CWE-131
critical
9.8