ID

VAR-200911-0284


CVE

CVE-2009-2832


TITLE

Apple Mac OS X of FTP Server Vulnerabilities in arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2009-002333

DESCRIPTION

Buffer overflow in FTP Server in Apple Mac OS X before 10.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a CWD command specifying a pathname in a deeply nested hierarchy of directories, related to a "CWD command line tool.". Apple Mac OS X is prone to a buffer-overflow vulnerability that affects the FTP component. Successful exploits may allow attackers to execute arbitrary code within the context of the application. Failed exploit attempts will likely result in a denial-of-service condition. NOTE: This issue was previously covered in BID 36956 (Apple Mac OS X 2009-006 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. Issuing CWD commands to deeply nested directory structures may lead to unexpected application termination or arbitrary code execution

Trust: 2.25

sources: NVD: CVE-2009-2832 // JVNDB: JVNDB-2009-002333 // BID: 36975 // BID: 36956 // VULHUB: VHN-40278

AFFECTED PRODUCTS

vendor:applemodel:mac os x serverscope:eqversion:10.1.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.0.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.0.2

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.0.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.0.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.1.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.0.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.1.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.3.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.11

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.1.0

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.1.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.0

Trust: 1.0

vendor:applemodel:mac os x serverscope:lteversion:10.6.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.1.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.10

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.0

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.8

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.8

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.0

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.2.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.8

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.6

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.9

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.5.0

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.9

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.4.8

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.2

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.6

vendor:applemodel:mac os serverscope:neversion:x10.6.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.2

Trust: 0.3

sources: BID: 36975 // BID: 36956 // JVNDB: JVNDB-2009-002333 // CNNVD: CNNVD-200911-107 // NVD: CVE-2009-2832

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2832
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-2832
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200911-107
value: MEDIUM

Trust: 0.6

VULHUB: VHN-40278
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2832
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40278
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40278 // JVNDB: JVNDB-2009-002333 // CNNVD: CNNVD-200911-107 // NVD: CVE-2009-2832

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-40278 // JVNDB: JVNDB-2009-002333 // NVD: CVE-2009-2832

THREAT TYPE

network

Trust: 0.6

sources: BID: 36975 // BID: 36956

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200911-107

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002333

PATCH

title:HT3937url:http://support.apple.com/kb/HT3937

Trust: 0.8

title:HT3937url:http://support.apple.com/kb/HT3937?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2009-002333

EXTERNAL IDS

db:NVDid:CVE-2009-2832

Trust: 2.8

db:VUPENid:ADV-2009-3184

Trust: 2.5

db:BIDid:36956

Trust: 2.0

db:JVNDBid:JVNDB-2009-002333

Trust: 0.8

db:CNNVDid:CNNVD-200911-107

Trust: 0.7

db:APPLEid:APPLE-SA-2009-11-09-1

Trust: 0.6

db:BIDid:36975

Trust: 0.4

db:VULHUBid:VHN-40278

Trust: 0.1

sources: VULHUB: VHN-40278 // BID: 36975 // BID: 36956 // JVNDB: JVNDB-2009-002333 // CNNVD: CNNVD-200911-107 // NVD: CVE-2009-2832

REFERENCES

url:http://www.vupen.com/english/advisories/2009/3184

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2009/nov/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/36956

Trust: 1.7

url:http://support.apple.com/kb/ht3937

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2832

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2832

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.6

sources: VULHUB: VHN-40278 // BID: 36975 // BID: 36956 // JVNDB: JVNDB-2009-002333 // CNNVD: CNNVD-200911-107 // NVD: CVE-2009-2832

CREDITS

Brian Mastenbrook Regis Duchesne Nicolas Joly

Trust: 0.6

sources: CNNVD: CNNVD-200911-107

SOURCES

db:VULHUBid:VHN-40278
db:BIDid:36975
db:BIDid:36956
db:JVNDBid:JVNDB-2009-002333
db:CNNVDid:CNNVD-200911-107
db:NVDid:CVE-2009-2832

LAST UPDATE DATE

2025-04-10T21:58:34.946000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-40278date:2009-11-17T00:00:00
db:BIDid:36975date:2009-11-10T22:06:00
db:BIDid:36956date:2009-11-11T20:56:00
db:JVNDBid:JVNDB-2009-002333date:2009-12-17T00:00:00
db:CNNVDid:CNNVD-200911-107date:2009-11-10T00:00:00
db:NVDid:CVE-2009-2832date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-40278date:2009-11-10T00:00:00
db:BIDid:36975date:2009-11-09T00:00:00
db:BIDid:36956date:2009-11-09T00:00:00
db:JVNDBid:JVNDB-2009-002333date:2009-12-17T00:00:00
db:CNNVDid:CNNVD-200911-107date:2009-11-10T00:00:00
db:NVDid:CVE-2009-2832date:2009-11-10T19:30:01.453