ID

VAR-200807-0009


CVE

CVE-2008-2311


TITLE

Apple Mac OS X of Launch Services Vulnerable to symbolic link attacks

Trust: 0.8

sources: JVNDB: JVNDB-2008-001478

DESCRIPTION

Launch Services in Apple Mac OS X before 10.5, when Open Safe Files is enabled, allows remote attackers to execute arbitrary code via a symlink attack, probably related to a race condition and automatic execution of a downloaded file. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-004 and Mac OS X/Mac OS X Server 10.5.4. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30802 VERIFY ADVISORY: http://secunia.com/advisories/30802/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities and a weakness. 1) An unspecified error in the Alias Manager when handling AFP volume mount information in an alias data structure can be exploited to cause a memory corruption and potentially execute arbitrary code. 2) A weakness is caused due to users not being warned before opening certain potentially unsafe content types, e.g. .xht and .xhtm files. 3) A format string error in c++filt can be exploited to exploited to execute arbitrary code when a specially crafted string is passed to the application. 4) An vulnerability in Dock can be exploited by malicious people with physical access to a system to bypass the screen lock when Expos\xe9 hot corners are set. 5) A race condition error exists in Launch Services in the download validation of symbolic links. This can be exploited to execute arbitrary code when a user visits a malicious web site. Successful exploitation requires that the "Open 'safe' files" option is enabled in Safari. 6) A vulnerability in Net-SNMP can be exploited by malicious people to spoof authenticated SNMPv3 packets. For more information: SA30574 7) Some vulnerabilities in Ruby can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. For more information: SA29232 SA29794 NOTE: Reportedly, the directory traversal issue does not affect Mac OS X. 8) A vulnerability in SMB File Server can be exploited by malicious people to compromise a vulnerable system. For more information: SA30228 9) It is possible to store malicious files within the User Template directory. This can be exploited to execute arbitrary code with permissions of a new user when his home directory is created using the User Template directory. 10) Some vulnerabilities in Tomcat can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information or to conduct cross-site scripting attacks. For more information: SA25678 SA26466 SA27398 SA28878 11) A vulnerability in WebKit can be exploited by malicious people to compromise a user's system. or apply Security Update 2008-004. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-2311 // JVNDB: JVNDB-2008-001478 // BID: 30018 // VULHUB: VHN-32436 // PACKETSTORM: 67844

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.11

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.10

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.11

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.10

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.9

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.8

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.5.4

Trust: 0.3

sources: BID: 30018 // JVNDB: JVNDB-2008-001478 // CNNVD: CNNVD-200807-004 // NVD: CVE-2008-2311

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2311
value: HIGH

Trust: 1.0

NVD: CVE-2008-2311
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200807-004
value: HIGH

Trust: 0.6

VULHUB: VHN-32436
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2311
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32436
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32436 // JVNDB: JVNDB-2008-001478 // CNNVD: CNNVD-200807-004 // NVD: CVE-2008-2311

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.9

problemtype:CWE-59

Trust: 1.9

sources: VULHUB: VHN-32436 // JVNDB: JVNDB-2008-001478 // NVD: CVE-2008-2311

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200807-004

TYPE

post link

Trust: 0.6

sources: CNNVD: CNNVD-200807-004

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001478

PATCH

title:Security Update 2008-004url:http://support.apple.com/kb/HT2163

Trust: 0.8

title:Security Update 2008-004url:http://support.apple.com/kb/HT2163?viewlocale=ja_JP&locale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001478

EXTERNAL IDS

db:NVDid:CVE-2008-2311

Trust: 2.8

db:BIDid:30018

Trust: 2.8

db:SECUNIAid:30802

Trust: 2.6

db:SECTRACKid:1020393

Trust: 2.5

db:VUPENid:ADV-2008-1981

Trust: 1.7

db:JVNDBid:JVNDB-2008-001478

Trust: 0.8

db:CNNVDid:CNNVD-200807-004

Trust: 0.7

db:SUPPORT.APPLE.COMid:HTTP://SUPPORT.APPLE.COM/KB/HT2163

Trust: 0.6

db:APPLEid:APPLE-SA-2008-06-30

Trust: 0.6

db:XFid:43495

Trust: 0.6

db:VULHUBid:VHN-32436

Trust: 0.1

db:PACKETSTORMid:67844

Trust: 0.1

sources: VULHUB: VHN-32436 // BID: 30018 // JVNDB: JVNDB-2008-001478 // PACKETSTORM: 67844 // CNNVD: CNNVD-200807-004 // NVD: CVE-2008-2311

REFERENCES

url:http://www.securityfocus.com/bid/30018

Trust: 2.5

url:http://securitytracker.com/id?1020393

Trust: 2.5

url:http://secunia.com/advisories/30802

Trust: 2.5

url:http://support.apple.com/kb/ht2163

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2008//jun/msg00002.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/1981/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43495

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2311

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2311

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/43495

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1981/references

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004serverppc.html

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004intel.html

Trust: 0.1

url:http://secunia.com/advisories/30574/

Trust: 0.1

url:http://secunia.com/advisories/29794/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004ppc.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1054update.html

Trust: 0.1

url:http://secunia.com/advisories/27398/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxservercombo1054.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008004serverintel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1054comboupdate.html

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1054.html

Trust: 0.1

url:http://secunia.com/advisories/30802/

Trust: 0.1

url:http://secunia.com/advisories/29232/

Trust: 0.1

url:http://secunia.com/advisories/25678/

Trust: 0.1

url:http://secunia.com/advisories/28878/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30775/

Trust: 0.1

url:http://secunia.com/advisories/26466/

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://secunia.com/advisories/30228/

Trust: 0.1

sources: VULHUB: VHN-32436 // BID: 30018 // JVNDB: JVNDB-2008-001478 // PACKETSTORM: 67844 // CNNVD: CNNVD-200807-004 // NVD: CVE-2008-2311

CREDITS

Brian MastenbrookAndrew CassellAndrew Mortensen

Trust: 0.6

sources: CNNVD: CNNVD-200807-004

SOURCES

db:VULHUBid:VHN-32436
db:BIDid:30018
db:JVNDBid:JVNDB-2008-001478
db:PACKETSTORMid:67844
db:CNNVDid:CNNVD-200807-004
db:NVDid:CVE-2008-2311

LAST UPDATE DATE

2025-04-10T20:04:17.030000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32436date:2017-08-08T00:00:00
db:BIDid:30018date:2008-07-02T20:00:00
db:JVNDBid:JVNDB-2008-001478date:2008-07-15T00:00:00
db:CNNVDid:CNNVD-200807-004date:2008-09-11T00:00:00
db:NVDid:CVE-2008-2311date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-32436date:2008-07-01T00:00:00
db:BIDid:30018date:2008-06-30T00:00:00
db:JVNDBid:JVNDB-2008-001478date:2008-07-15T00:00:00
db:PACKETSTORMid:67844date:2008-07-02T17:42:37
db:CNNVDid:CNNVD-200807-004date:2008-06-30T00:00:00
db:NVDid:CVE-2008-2311date:2008-07-01T18:41:00