ID

VAR-200911-0263


CVE

CVE-2009-2810


TITLE

Apple Mac OS X of Launch Services Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2009-002338

DESCRIPTION

Launch Services in Apple Mac OS X 10.6.x before 10.6.2 recursively clears quarantine information upon opening a quarantined folder, which allows user-assisted remote attackers to execute arbitrary code via a quarantined application that does not trigger a "potentially unsafe" warning message. Apple Mac OS X is prone to a remote security-bypass vulnerability that affects the Launch Services API. An attacker can exploit this issue by enticing a user to download a malicious file and launch it without being warned. Successful exploits may bypass the security feature that displays a warning dialog box before executing malicious files from the quarantined directory. This issue affects the following: Mac OS X 10.6 and 10.6.1 Mac OS X Server 10.6 and 10.6.1 NOTE: This issue was previously covered in BID 36956 (Apple Mac OS X 2009-006 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. This may allow unsafe items such as applications to be launched without a warning dialog

Trust: 2.25

sources: NVD: CVE-2009-2810 // JVNDB: JVNDB-2009-002338 // BID: 36987 // BID: 36956 // VULHUB: VHN-40256

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:v10.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.6

vendor:applemodel:mac os serverscope:neversion:x10.6.2

Trust: 0.6

vendor:applemodel:mac osscope:neversion:x10.6.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

sources: BID: 36987 // BID: 36956 // JVNDB: JVNDB-2009-002338 // CNNVD: CNNVD-200911-094 // NVD: CVE-2009-2810

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2810
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-2810
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200911-094
value: MEDIUM

Trust: 0.6

VULHUB: VHN-40256
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2810
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40256
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40256 // JVNDB: JVNDB-2009-002338 // CNNVD: CNNVD-200911-094 // NVD: CVE-2009-2810

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2009-002338 // NVD: CVE-2009-2810

THREAT TYPE

network

Trust: 0.6

sources: BID: 36987 // BID: 36956

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200911-094

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002338

PATCH

title:HT3937url:http://support.apple.com/kb/HT3937

Trust: 0.8

title:HT3937url:http://support.apple.com/kb/HT3937?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2009-002338

EXTERNAL IDS

db:NVDid:CVE-2009-2810

Trust: 2.8

db:VUPENid:ADV-2009-3184

Trust: 2.5

db:BIDid:36956

Trust: 2.0

db:JVNDBid:JVNDB-2009-002338

Trust: 0.8

db:CNNVDid:CNNVD-200911-094

Trust: 0.7

db:APPLEid:APPLE-SA-2009-11-09-1

Trust: 0.6

db:BIDid:36987

Trust: 0.4

db:VULHUBid:VHN-40256

Trust: 0.1

sources: VULHUB: VHN-40256 // BID: 36987 // BID: 36956 // JVNDB: JVNDB-2009-002338 // CNNVD: CNNVD-200911-094 // NVD: CVE-2009-2810

REFERENCES

url:http://www.vupen.com/english/advisories/2009/3184

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2009/nov/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/36956

Trust: 1.7

url:http://support.apple.com/kb/ht3937

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2810

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2810

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

sources: VULHUB: VHN-40256 // BID: 36987 // BID: 36956 // JVNDB: JVNDB-2009-002338 // CNNVD: CNNVD-200911-094 // NVD: CVE-2009-2810

CREDITS

Brian Mastenbrook Regis Duchesne Nicolas Joly

Trust: 0.6

sources: CNNVD: CNNVD-200911-094

SOURCES

db:VULHUBid:VHN-40256
db:BIDid:36987
db:BIDid:36956
db:JVNDBid:JVNDB-2009-002338
db:CNNVDid:CNNVD-200911-094
db:NVDid:CVE-2009-2810

LAST UPDATE DATE

2025-04-10T22:06:09.151000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-40256date:2009-11-17T00:00:00
db:BIDid:36987date:2009-11-11T20:56:00
db:BIDid:36956date:2009-11-11T20:56:00
db:JVNDBid:JVNDB-2009-002338date:2009-12-18T00:00:00
db:CNNVDid:CNNVD-200911-094date:2009-11-10T00:00:00
db:NVDid:CVE-2009-2810date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-40256date:2009-11-10T00:00:00
db:BIDid:36987date:2009-11-09T00:00:00
db:BIDid:36956date:2009-11-09T00:00:00
db:JVNDBid:JVNDB-2009-002338date:2009-12-18T00:00:00
db:CNNVDid:CNNVD-200911-094date:2009-11-10T00:00:00
db:NVDid:CVE-2009-2810date:2009-11-10T19:30:01.093