ID

VAR-200808-0007


CVE

CVE-2008-2324


TITLE

Apple Mac OS X Elevation of privilege vulnerability in Disk Utility

Trust: 0.8

sources: JVNDB: JVNDB-2008-001601

DESCRIPTION

The Repair Permissions tool in Disk Utility in Apple Mac OS X 10.4.11 adds the setuid bit to the emacs executable file, which allows local users to gain privileges by executing commands within emacs. Apple Mac OS X is prone to multiple security vulnerabilities that have been addressed in Security Update 2008-005. The security update addresses a total of six new vulnerabilities that affect the CarbonCore, CoreGraphics, Data Detectors Engine, Disk Utility, OpenLDAP, and QuickLook components of Mac OS X. The advisory also contains security updates for 11 previously reported issues. NOTE: This BID is being retired; the following individual records have been created to better document these issues: 30487 Apple Mac OS X CarbonCore Stack Based Buffer Overflow 30488 Apple Mac OS X CoreGraphics Multiple Memory Corruption Vulnerabilities 30489 Apple Mac OS X CoreGraphics Heap Based Buffer Overflow Vulnerability 30490 Apple Mac OS X Data Detectors Engine Denial Of Service Vulnerability 30492 Apple Mac OS X Disk Utility Privilege Escalation Vulnerability 30493 Apple Mac OS X QuickLook Multiple Memory Corruption Vulnerabilities. An unprivileged local user may exploit this issue to run commands with system-level privileges. The following versions are affected: Mac OS X v10.4.11 and prior Mac OS X Server v10.4.11 and prior This issue does not affect systems running Mac OS X v10.5 and later. 1) A vulnerability in BIND can be exploited to poison the DNS cache. For more information: SA30973 2) A boundary error exists in CarbonCore when handling filenames. This can be exploited to cause a stack-based buffer overflow via overly long filenames. Successful exploitation of the vulnerability may allow execution of arbitrary code. 3) Multiple errors exist in CoreGraphics when processing received arguments. These can be exploited to trigger a memory corruption by e.g. tricking a user into visiting a specially crafted website. Successful exploitation of the vulnerability may allow execution of arbitrary code. 4) An integer overflow error exists in CoreGraphics when handling PDF files. This can be exploited to cause a heap-based buffer overflow via a specially crafted PDF file. Successful exploitation of the vulnerability may allow execution of arbitrary code. 5) Multiple errors in QuickLook when downloading Microsoft Office files can be exploited to cause a memory corruption. Successful exploitation of the vulnerability may allow execution of arbitrary code. 6) An error exists in the Data Detectors engine when viewing a specially crafted message. This can be exploited to consume overly large resources and trigger an application using the engine to terminate. 7) The problem is that the "Repair Permissions" tool included in Disk Utility sets the "setuid" bit on "/usr/bin/emacs". This can be exploited to execute arbitrary commands with system privileges. 8) An error in OpenLDAP when parsing ASN.1 BER encoded packets can be exploited to cause a DoS. For more information: SA30853 9) A boundary error exists in the OpenSSL "SSL_get_shared_ciphers()" function. For more information see vulnerability #4 in: SA22130 10) Some vulnerabilities in PHP can be exploited malicious users to bypass certain security restrictions, and potentially by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. For more information: SA30048 11) Two vulnerabilities in rsync can be exploited by malicious users to bypass certain security restrictions. For more information: SA27863 SOLUTION: Apply Security Update 2008-005. Security Update 2008-005 Server (PPC): http://www.apple.com/support/downloads/securityupdate2008005serverppc.html Security Update 2008-005 Server (Intel): http://www.apple.com/support/downloads/securityupdate2008005serverintel.html Security Update 2008-005 (PPC): http://www.apple.com/support/downloads/securityupdate2008005ppc.html Security Update 2008-005 (Intel): http://www.apple.com/support/downloads/securityupdate2008005intel.html Security Update 2008-005 (Leopard): http://www.apple.com/support/downloads/securityupdate2008005leopard.html PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Dan Kaminsky of IOActive 2) Thomas Raffetseder of the International Secure Systems Lab and Sergio 'shadown' Alvarez of n.runs AG. 3) Michal Zalewski, Google 4) Pariente Kobi, reported via iDefense 7) Anton Rang and Brian Timares ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT2647 OTHER REFERENCES: SA22130: http://secunia.com/advisories/22130/ SA27863: http://secunia.com/advisories/27863/ SA30048: http://secunia.com/advisories/30048/ SA30973: http://secunia.com/advisories/30973/ SA30853: http://secunia.com/advisories/30853/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2008-2324 // JVNDB: JVNDB-2008-001601 // BID: 30483 // BID: 30492 // VULHUB: VHN-32449 // PACKETSTORM: 68761

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.4.11

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.11

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.5.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.4

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

sources: BID: 30483 // BID: 30492 // JVNDB: JVNDB-2008-001601 // CNNVD: CNNVD-200808-028 // NVD: CVE-2008-2324

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2324
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-2324
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200808-028
value: MEDIUM

Trust: 0.6

VULHUB: VHN-32449
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-2324
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32449
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32449 // JVNDB: JVNDB-2008-001601 // CNNVD: CNNVD-200808-028 // NVD: CVE-2008-2324

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-32449 // JVNDB: JVNDB-2008-001601 // NVD: CVE-2008-2324

THREAT TYPE

local

Trust: 0.9

sources: BID: 30492 // CNNVD: CNNVD-200808-028

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200808-028

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001601

PATCH

title:Security Update 2008-005url:http://support.apple.com/kb/HT2647

Trust: 0.8

title:Security Update 2008-005url:http://support.apple.com/kb/HT2647?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001601

EXTERNAL IDS

db:NVDid:CVE-2008-2324

Trust: 3.1

db:BIDid:30492

Trust: 2.8

db:SECUNIAid:31326

Trust: 2.6

db:BIDid:30483

Trust: 2.0

db:VUPENid:ADV-2008-2268

Trust: 1.7

db:SECTRACKid:1020605

Trust: 1.7

db:JVNDBid:JVNDB-2008-001601

Trust: 0.8

db:APPLEid:APPLE-SA-2008-07-31

Trust: 0.6

db:XFid:44132

Trust: 0.6

db:CNNVDid:CNNVD-200808-028

Trust: 0.6

db:VULHUBid:VHN-32449

Trust: 0.1

db:PACKETSTORMid:68761

Trust: 0.1

sources: VULHUB: VHN-32449 // BID: 30483 // BID: 30492 // JVNDB: JVNDB-2008-001601 // PACKETSTORM: 68761 // CNNVD: CNNVD-200808-028 // NVD: CVE-2008-2324

REFERENCES

url:http://www.securityfocus.com/bid/30492

Trust: 2.5

url:http://secunia.com/advisories/31326

Trust: 2.5

url:http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html

Trust: 1.7

url:http://www.securityfocus.com/bid/30483

Trust: 1.7

url:http://www.securitytracker.com/id?1020605

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/2268

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/2268

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/44132

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2324

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2324

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/44132

Trust: 0.6

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/advisories/27863/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://support.apple.com/kb/ht2647

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005leopard.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005serverintel.html

Trust: 0.1

url:http://secunia.com/advisories/22130/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30048/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005intel.html

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005serverppc.html

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30853/

Trust: 0.1

url:http://secunia.com/advisories/30973/

Trust: 0.1

url:http://secunia.com/advisories/31326/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008005ppc.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

sources: VULHUB: VHN-32449 // BID: 30483 // BID: 30492 // JVNDB: JVNDB-2008-001601 // PACKETSTORM: 68761 // CNNVD: CNNVD-200808-028 // NVD: CVE-2008-2324

CREDITS

Michal Zalewski※ lcamtuf@echelon.pl

Trust: 0.6

sources: CNNVD: CNNVD-200808-028

SOURCES

db:VULHUBid:VHN-32449
db:BIDid:30483
db:BIDid:30492
db:JVNDBid:JVNDB-2008-001601
db:PACKETSTORMid:68761
db:CNNVDid:CNNVD-200808-028
db:NVDid:CVE-2008-2324

LAST UPDATE DATE

2025-04-10T21:50:08.799000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32449date:2017-08-08T00:00:00
db:BIDid:30483date:2008-08-01T17:57:00
db:BIDid:30492date:2008-08-01T17:17:00
db:JVNDBid:JVNDB-2008-001601date:2008-09-03T00:00:00
db:CNNVDid:CNNVD-200808-028date:2008-09-11T00:00:00
db:NVDid:CVE-2008-2324date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-32449date:2008-08-04T00:00:00
db:BIDid:30483date:2008-07-31T00:00:00
db:BIDid:30492date:2008-07-31T00:00:00
db:JVNDBid:JVNDB-2008-001601date:2008-09-03T00:00:00
db:PACKETSTORMid:68761date:2008-08-01T22:41:42
db:CNNVDid:CNNVD-200808-028date:2008-07-31T00:00:00
db:NVDid:CVE-2008-2324date:2008-08-04T01:41:00