CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
5.3%
Apple Mac OS X Server NeST tool contains a vulnerability in the processing of command line arguments that could allow an attacker to execute arbitrary code.
NeST is the NetInfo Setup Tool for Apple Mac OS X Server. There is a buffer overflow vulnerability in the way NeST performs bounds checking on command line arguments. By supplying the -target
command line parameter with an overly long string of characters, a local user could execute arbitrary code on the system with privileges of the NeST process.
Please note that NeST executes with root
privileges.
A local user could execute arbitrary code with privileges of the NeST process, possibly root
.
Apply Update
Apple has released Apple Security update 2005-005 to correct this issue.
354486
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: May 13, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://docs.info.apple.com/article.html?artnum=301528> for more information.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23354486 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by iDEFENSE Labs who acknowledges Nico for providing information concerning this vulnerability.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2005-0594 |
---|---|
Severity Metric: | 10.69 Date Public: |