7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.4%
Apple’s Mac OS X operating system may allow local privilege escalation in family of “at” commands.
Mac OS X includes the “at” family of commands in order to schedule tasks. However, a flaw in these commands results in the commands not dropping privileges correctly. This may allow a malicious local user to run commands with additional privileges, read or remove protected files, or gain other unintended access.
The affected commands include: at
, atq
, atrm
, atrun
, and batch
.
These commands are disabled by default in Mac OS X. If they have been enabled, a malicious local user may gain additional privileges including the ability to remove or read protected files, or run programs with additional privileges.
Apply a patch
Apple advises all users to apply Apple Security Update 2005-001, as it fixes this flaw and other critical security flaws.
678150
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: January 27, 2005
Affected
Please see the following link for the statement from Apple Computer Inc.:
<<http://docs.info.apple.com/article.html?artnum=300770>>
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23678150 Feedback>).
Group | Score | Vector |
---|---|---|
Base | 0 | AV:–/AC:–/Au:–/C:–/I:–/A:– |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
Thanks to Apple Product Security for reporting this vulnerability. Apple in turn thanks Kevin Finisterre of Immunity, Inc. for reporting this vulnerability.
This document was written by Ken MacInnis.
CVE IDs: | CVE-2005-0125 |
---|---|
Severity Metric: | 8.10 Date Public: |