ID

VAR-200711-0321


CVE

CVE-2007-4704


TITLE

Apple Mac OS X Of bypassing application firewall restrictions on Windows

Trust: 0.8

sources: JVNDB: JVNDB-2007-000985

DESCRIPTION

The Application Firewall in Apple Mac OS X 10.5 does not apply changed settings to processes that are started by launchd until the processes are restarted, which might allow attackers to bypass intended access restrictions. This issue may result in a false sense of security and leave certain processes vulnerable to external attack. This issue affects Mac OS X 10.5 and Mac OS X Server 10.5; earlier versions are not affected. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Apple Mac OS X Application Firewall Weaknesses and Security Issue SECUNIA ADVISORY ID: SA27695 VERIFY ADVISORY: http://secunia.com/advisories/27695/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: Some weaknesses and a security issue have been reported in Apple Mac OS X, which can lead to exposure of certain services. 1) The Application Firewall allows any process running as user "root" (UID 0) to receive incoming connections even though the option "Block all incoming connections" is set. NOTE: The update changes the name of the option and updates the documentation. 2) The Application Firewall allows any process running as user "root" (UID 0) to receive incoming connections even though the executable has been added to the list of blocked applications via the "Set access for specific services and applications" option. This may lead to exposure of certain services. Mac OS X 10.5.1 Update: http://www.apple.com/support/downloads/macosx1051update.html Mac OS X Server 10.5.1 Update http://www.apple.com/support/downloads/macosxserver1051update.html PROVIDED AND/OR DISCOVERED BY: J\xfcrgen Schmidt ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307004 heise Security: http://www.heise-security.co.uk/articles/98120 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4704 // JVNDB: JVNDB-2007-000985 // BID: 26459 // VULHUB: VHN-28066 // PACKETSTORM: 61016

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.5

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.5.1

Trust: 0.3

sources: BID: 26459 // JVNDB: JVNDB-2007-000985 // CNNVD: CNNVD-200711-255 // NVD: CVE-2007-4704

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4704
value: HIGH

Trust: 1.0

NVD: CVE-2007-4704
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200711-255
value: CRITICAL

Trust: 0.6

VULHUB: VHN-28066
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4704
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28066
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28066 // JVNDB: JVNDB-2007-000985 // CNNVD: CNNVD-200711-255 // NVD: CVE-2007-4704

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2007-000985 // NVD: CVE-2007-4704

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-255

TYPE

Design Error

Trust: 0.9

sources: BID: 26459 // CNNVD: CNNVD-200711-255

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000985

PATCH

title:Mac OS X v10.5.1 Updateurl:http://docs.info.apple.com/article.html?artnum=307004-en

Trust: 0.8

title:Mac OS X v10.5.1 Updateurl:http://docs.info.apple.com/article.html?artnum=307004-jp

Trust: 0.8

sources: JVNDB: JVNDB-2007-000985

EXTERNAL IDS

db:BIDid:26459

Trust: 2.8

db:NVDid:CVE-2007-4704

Trust: 2.8

db:SECUNIAid:27695

Trust: 2.6

db:SECTRACKid:1018958

Trust: 2.5

db:VUPENid:ADV-2007-3897

Trust: 1.7

db:XFid:38492

Trust: 1.4

db:JVNDBid:JVNDB-2007-000985

Trust: 0.8

db:CNNVDid:CNNVD-200711-255

Trust: 0.7

db:APPLEid:APPLE-SA-2007-11-15

Trust: 0.6

db:VULHUBid:VHN-28066

Trust: 0.1

db:PACKETSTORMid:61016

Trust: 0.1

sources: VULHUB: VHN-28066 // BID: 26459 // JVNDB: JVNDB-2007-000985 // PACKETSTORM: 61016 // CNNVD: CNNVD-200711-255 // NVD: CVE-2007-4704

REFERENCES

url:http://www.securityfocus.com/bid/26459

Trust: 2.5

url:http://securitytracker.com/id?1018958

Trust: 2.5

url:http://docs.info.apple.com/article.html?artnum=307004

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2007/nov/msg00004.html

Trust: 1.7

url:http://secunia.com/advisories/27695

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/3897

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/38492

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/3897

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38492

Trust: 1.1

url:http://secunia.com/advisories/27695/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4704

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4704

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1051update.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1051update.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.heise-security.co.uk/articles/98120

Trust: 0.1

sources: VULHUB: VHN-28066 // BID: 26459 // JVNDB: JVNDB-2007-000985 // PACKETSTORM: 61016 // CNNVD: CNNVD-200711-255 // NVD: CVE-2007-4704

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-200711-255

SOURCES

db:VULHUBid:VHN-28066
db:BIDid:26459
db:JVNDBid:JVNDB-2007-000985
db:PACKETSTORMid:61016
db:CNNVDid:CNNVD-200711-255
db:NVDid:CVE-2007-4704

LAST UPDATE DATE

2025-04-10T23:03:33.998000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28066date:2017-07-29T00:00:00
db:BIDid:26459date:2007-11-15T22:24:00
db:JVNDBid:JVNDB-2007-000985date:2007-12-07T00:00:00
db:CNNVDid:CNNVD-200711-255date:2007-11-16T00:00:00
db:NVDid:CVE-2007-4704date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-28066date:2007-11-15T00:00:00
db:BIDid:26459date:2007-11-15T00:00:00
db:JVNDBid:JVNDB-2007-000985date:2007-12-07T00:00:00
db:PACKETSTORMid:61016date:2007-11-20T16:17:55
db:CNNVDid:CNNVD-200711-255date:2007-11-15T00:00:00
db:NVDid:CVE-2007-4704date:2007-11-15T20:46:00