ID

VAR-200809-0209


CVE

CVE-2008-3637


TITLE

Apple Mac OS X  is running on  Java  of  HMAC  provider   Vulnerability to execute arbitrary code in

Trust: 0.8

sources: JVNDB: JVNDB-2008-001738

DESCRIPTION

The Hash-based Message Authentication Code (HMAC) provider in Java on Apple Mac OS X 10.4.11, 10.5.4, and 10.5.5 uses an uninitialized variable, which allows remote attackers to execute arbitrary code via a crafted applet, related to an "error checking issue.". Successful exploits will allow an attacker to run arbitrary code in the context of the affected software. Failed exploit attempts may result in denial-of-service conditions. This issue affects the following: Mac OS X 10.5.5 (and prior versions) Mac OS X Server 10.5.5 (and prior versions) Mac OS X 10.4.11 (and prior versions) Mac OS X Server 10.4.11 (and prior versions). It is related to a "false detection vulnerability". ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Mac OS X Java Multiple Vulnerabilities SECUNIA ADVISORY ID: SA32018 VERIFY ADVISORY: http://secunia.com/advisories/32018/ CRITICAL: Highly critical IMPACT: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/advisories/product/96/ DESCRIPTION: Some vulnerabilities have been reported and acknowledged in Java for Mac OS X, which can be exploited by malicious people to cause a DoS (Denial of Service), to bypass certain security restrictions, disclose system information or potentially sensitive information, or to compromise a vulnerable system. 2) An error in the Java plug-in within the handling of "file://" URLs can be exploited to launch local files when a user visits a web page containing a specially crafted java applet. 3) Some vulnerabilities in Java 1.4.2_16 and Java 1.5.0_13 can be exploited by malicious people to cause a DoS (Denial of Service), to bypass certain security restrictions, disclose system information or potentially sensitive information, or to compromise a vulnerable system. For more information: SA29239 SA31010 SOLUTION: -- Java for Mac OS X 10.4 -- Update to Release 7: http://www.apple.com/support/downloads/javaformacosx104release7.html -- Java for Mac OS X 10.5 -- Apply Update 2: http://www.apple.com/support/downloads/javaformacosx105update2.html PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Radim Marek. 2) The vendor credits Nitesh Dhanjani and Billy Rios. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT3179 http://support.apple.com/kb/HT3178 OTHER REFERENCES: SA28115 http://secunia.com/advisories/28115/ SA29239: http://secunia.com/advisories/29239/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-3637 // JVNDB: JVNDB-2008-001738 // BID: 31379 // VULHUB: VHN-33762 // PACKETSTORM: 70342

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.5.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.5

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.4.11

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.4.11

Trust: 1.6

vendor:アップルmodel:apple mac os xscope:eqversion:server v10.5.4 to v10.5.5

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:server v10.4.11

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:アップルmodel:apple mac os x serverscope:eqversion:v10.5.4 to v10.5.5

Trust: 0.8

vendor:アップルmodel:apple mac os xscope:eqversion:v10.5.4 to v10.5.5

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

sources: BID: 31379 // JVNDB: JVNDB-2008-001738 // CNNVD: CNNVD-200809-363 // NVD: CVE-2008-3637

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3637
value: HIGH

Trust: 1.0

NVD: CVE-2008-3637
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-363
value: CRITICAL

Trust: 0.6

VULHUB: VHN-33762
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3637
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33762
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2008-3637
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2008-3637
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-33762 // JVNDB: JVNDB-2008-001738 // CNNVD: CNNVD-200809-363 // NVD: CVE-2008-3637

PROBLEMTYPE DATA

problemtype:CWE-665

Trust: 1.0

problemtype:Improper initialization (CWE-665) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-94

Trust: 0.1

sources: VULHUB: VHN-33762 // JVNDB: JVNDB-2008-001738 // NVD: CVE-2008-3637

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200809-363

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-200809-363

PATCH

title:Mac OS X 10.4, Release 7 Apple  Security updateurl:http://support.apple.com/kb/HT3178

Trust: 0.8

sources: JVNDB: JVNDB-2008-001738

EXTERNAL IDS

db:NVDid:CVE-2008-3637

Trust: 3.6

db:BIDid:31379

Trust: 2.8

db:SECUNIAid:32018

Trust: 2.6

db:SECTRACKid:1020943

Trust: 1.1

db:JVNDBid:JVNDB-2008-001738

Trust: 0.8

db:APPLEid:APPLE-SA-2008-09-24

Trust: 0.6

db:CNNVDid:CNNVD-200809-363

Trust: 0.6

db:VULHUBid:VHN-33762

Trust: 0.1

db:PACKETSTORMid:70342

Trust: 0.1

sources: VULHUB: VHN-33762 // BID: 31379 // JVNDB: JVNDB-2008-001738 // PACKETSTORM: 70342 // CNNVD: CNNVD-200809-363 // NVD: CVE-2008-3637

REFERENCES

url:http://www.securityfocus.com/bid/31379

Trust: 2.5

url:http://secunia.com/advisories/32018

Trust: 2.5

url:http://support.apple.com/kb/ht3178

Trust: 1.8

url:http://support.apple.com/kb/ht3179

Trust: 1.8

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00007.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00008.html

Trust: 1.7

url:http://www.securitytracker.com/id?1020943

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/45396

Trust: 1.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3637

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://secunia.com/advisories/32018/

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://secunia.com/advisories/28115/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://www.apple.com/support/downloads/javaformacosx105update2.html

Trust: 0.1

url:http://secunia.com/advisories/29239/

Trust: 0.1

url:http://secunia.com/advisories/product/96/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.apple.com/support/downloads/javaformacosx104release7.html

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33762 // BID: 31379 // JVNDB: JVNDB-2008-001738 // PACKETSTORM: 70342 // CNNVD: CNNVD-200809-363 // NVD: CVE-2008-3637

CREDITS

Radim Marek

Trust: 0.9

sources: BID: 31379 // CNNVD: CNNVD-200809-363

SOURCES

db:VULHUBid:VHN-33762
db:BIDid:31379
db:JVNDBid:JVNDB-2008-001738
db:PACKETSTORMid:70342
db:CNNVDid:CNNVD-200809-363
db:NVDid:CVE-2008-3637

LAST UPDATE DATE

2025-04-10T19:42:09.036000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33762date:2017-08-08T00:00:00
db:BIDid:31379date:2008-09-25T16:49:00
db:JVNDBid:JVNDB-2008-001738date:2024-03-04T06:17:00
db:CNNVDid:CNNVD-200809-363date:2008-09-29T00:00:00
db:NVDid:CVE-2008-3637date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33762date:2008-09-26T00:00:00
db:BIDid:31379date:2008-09-25T00:00:00
db:JVNDBid:JVNDB-2008-001738date:2008-10-15T00:00:00
db:PACKETSTORMid:70342date:2008-09-25T23:06:17
db:CNNVDid:CNNVD-200809-363date:2008-09-26T00:00:00
db:NVDid:CVE-2008-3637date:2008-09-26T16:21:43.970