ID

VAR-201101-0015


CVE

CVE-2010-4013


TITLE

Apple Mac OS X Updates for vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2011-001008

DESCRIPTION

Format string vulnerability in PackageKit in Apple Mac OS X 10.6.x before 10.6.6 allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to interaction between Software Update and distribution scripts. Apple Mac OS X is prone to a remote code-execution vulnerability due to a format-string issue in the PackageKit component. An attacker can exploit this issue by conducting a man-in-the-middle attack. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects Apple Mac OS X 10.6 versions. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Apple Mac OS X PackageKit Format String Vulnerability SECUNIA ADVISORY ID: SA42841 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42841/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42841 RELEASE DATE: 2011-01-08 DISCUSS ADVISORY: http://secunia.com/advisories/42841/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42841/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42841 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Mac OS X, which can be exploited by malicious people to potentially compromise a vulnerable system. The vulnerability is caused due to a format string error when handling distribution scripts during Software Update checks and can be exploited to corrupt memory. via Man-in-the-Middle (MitM) attacks. SOLUTION: Apply 10.6.6 updates. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Aaron Sigel, vtty.com. ORIGINAL ADVISORY: http://support.apple.com/kb/HT4498 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2010-4013 // JVNDB: JVNDB-2011-001008 // BID: 45693 // VULHUB: VHN-46618 // PACKETSTORM: 97345

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.6.3

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.4

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.1

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.5

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.3

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.0

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.6.5

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.6.1

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:v10.6 from v10.6.5

Trust: 0.8

vendor:applemodel:mac os x serverscope:lteversion:v10.6 from v10.6.5

Trust: 0.8

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.6

Trust: 0.3

sources: BID: 45693 // JVNDB: JVNDB-2011-001008 // CNNVD: CNNVD-201101-079 // NVD: CVE-2010-4013

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4013
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-4013
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201101-079
value: MEDIUM

Trust: 0.6

VULHUB: VHN-46618
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-4013
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-46618
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-46618 // JVNDB: JVNDB-2011-001008 // CNNVD: CNNVD-201101-079 // NVD: CVE-2010-4013

PROBLEMTYPE DATA

problemtype:CWE-134

Trust: 1.8

sources: JVNDB: JVNDB-2011-001008 // NVD: CVE-2010-4013

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201101-079

TYPE

format string

Trust: 0.6

sources: CNNVD: CNNVD-201101-079

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001008

PATCH

title:HT4498url:http://support.apple.com/kb/HT4498

Trust: 0.8

title:HT4498url:http://support.apple.com/kb/HT4498?viewlocale=ja_JP

Trust: 0.8

title:MacOSXUpd10.6.6url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=36057

Trust: 0.6

sources: JVNDB: JVNDB-2011-001008 // CNNVD: CNNVD-201101-079

EXTERNAL IDS

db:NVDid:CVE-2010-4013

Trust: 2.8

db:SECUNIAid:42841

Trust: 2.6

db:OSVDBid:70309

Trust: 1.9

db:VUPENid:ADV-2011-0050

Trust: 1.9

db:SECTRACKid:1024938

Trust: 1.9

db:BIDid:45693

Trust: 1.2

db:JVNDBid:JVNDB-2011-001008

Trust: 0.8

db:CNNVDid:CNNVD-201101-079

Trust: 0.7

db:NSFOCUSid:16278

Trust: 0.6

db:APPLEid:APPLE-SA-2011-01-06-1

Trust: 0.6

db:VULHUBid:VHN-46618

Trust: 0.1

db:PACKETSTORMid:97345

Trust: 0.1

sources: VULHUB: VHN-46618 // BID: 45693 // JVNDB: JVNDB-2011-001008 // PACKETSTORM: 97345 // CNNVD: CNNVD-201101-079 // NVD: CVE-2010-4013

REFERENCES

url:http://secunia.com/advisories/42841

Trust: 2.5

url:http://support.apple.com/kb/ht4498

Trust: 2.1

url:http://osvdb.org/70309

Trust: 1.9

url:http://www.securitytracker.com/id?1024938

Trust: 1.9

url:http://www.vupen.com/english/advisories/2011/0050

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2011//jan/msg00000.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4013

Trust: 0.8

url:http://jvn.jp/cert/jvnvu316308

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4013

Trust: 0.8

url:http://www.securityfocus.com/bid/45693

Trust: 0.8

url:http://www.nsfocus.net/vulndb/16278

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://secunia.com/advisories/42841/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42841

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/42841/#comments

Trust: 0.1

sources: VULHUB: VHN-46618 // BID: 45693 // JVNDB: JVNDB-2011-001008 // PACKETSTORM: 97345 // CNNVD: CNNVD-201101-079 // NVD: CVE-2010-4013

CREDITS

Aaron Sigel of vtty.com

Trust: 0.3

sources: BID: 45693

SOURCES

db:VULHUBid:VHN-46618
db:BIDid:45693
db:JVNDBid:JVNDB-2011-001008
db:PACKETSTORMid:97345
db:CNNVDid:CNNVD-201101-079
db:NVDid:CVE-2010-4013

LAST UPDATE DATE

2025-04-11T23:14:54.579000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-46618date:2011-01-20T00:00:00
db:BIDid:45693date:2011-01-06T00:00:00
db:JVNDBid:JVNDB-2011-001008date:2011-01-25T00:00:00
db:CNNVDid:CNNVD-201101-079date:2011-01-11T00:00:00
db:NVDid:CVE-2010-4013date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-46618date:2011-01-10T00:00:00
db:BIDid:45693date:2011-01-06T00:00:00
db:JVNDBid:JVNDB-2011-001008date:2011-01-25T00:00:00
db:PACKETSTORMid:97345date:2011-01-08T12:03:04
db:CNNVDid:CNNVD-201101-079date:2011-01-11T00:00:00
db:NVDid:CVE-2010-4013date:2011-01-10T20:00:15.953