Lucene search

K
nessusThis script is Copyright (C) 2007-2023 Tenable Network Security, Inc.MACOSX_SECUPD2007-001.NASL
HistoryJan 24, 2007 - 12:00 a.m.

Mac OS X Security Update 2007-001

2007-01-2400:00:00
This script is Copyright (C) 2007-2023 Tenable Network Security, Inc.
www.tenable.com
10

7.5 High

AI Score

Confidence

Low

The remote host is running a version of Mac OS X 10.3 or 10.4 which does not have Security Update 2007-001 applied.

This update fixes a flaw in QuickTime which may allow a rogue website to execute arbitrary code on the remote host by exploiting an overflow in the RTSP URL handler.

#TRUSTED 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
#TRUST-RSA-SHA256 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(24234);
  script_version("1.25");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/27");

  script_cve_id("CVE-2007-0015");
  script_bugtraq_id(21829);

  script_name(english:"Mac OS X Security Update 2007-001");
  script_summary(english:"Check for the presence of the SecUpdate 2007-001");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a Mac OS X update which fixes a security
issue.");
  script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X 10.3 or 10.4 which
does not have Security Update 2007-001 applied.

This update fixes a flaw in QuickTime which may allow a rogue website to
execute arbitrary code on the remote host by exploiting an overflow in
the RTSP URL handler.");
  script_set_attribute(attribute:"see_also", value:"http://docs.info.apple.com/article.html?artnum=304989");
  # http://www.apple.com/support/downloads/securityupdate2007001universal.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c80700ff");
  script_set_attribute(attribute:"see_also", value:"http://www.apple.com/support/downloads/securityupdate2007001panther.html");
  script_set_attribute(attribute:"solution", value:"Install Security Update 2007-001.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-0015");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Apple QuickTime 7.1.3 RTSP URI Buffer Overflow');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
  script_set_attribute(attribute:"canvas_package", value:'CANVAS');

  script_set_attribute(attribute:"vuln_publication_date", value:"2007/01/01");
  script_set_attribute(attribute:"patch_publication_date", value:"2007/01/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/01/24");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);

  script_copyright(english:"This script is Copyright (C) 2007-2023 Tenable Network Security, Inc.");
  script_family(english:"MacOS X Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/MacOSX/packages");
  exit(0);
}

include("misc_func.inc");
include("ssh_func.inc");
include("macosx_func.inc");


enable_ssh_wrappers();

function exec(cmd)
{
 local_var buf, ret, soc;

 if ( islocalhost() )
  buf = pread_wrapper(cmd:"/bin/bash", argv:make_list("bash", "-c", cmd));
 else
 {
  ret = ssh_open_connection();
  if ( ! ret ) exit(0);
  buf = ssh_cmd(cmd:cmd);
  ssh_close_connection();
 }

 if ( buf !~ "^[0-9]" ) exit(0);

 buf = chomp(buf);
 return buf;
}

# Look at the exact version of QuickTimeStreaming
cmd = GetBundleVersionCmd(file:"QuickTimeStreaming.component", path:"/System/Library/Quicktime");
buf = exec(cmd:cmd);
set_kb_item(name:"MacOSX/QuickTimeSteaming/Version", value:buf);

version = split(buf, sep:'.', keep:FALSE);

if (( int(version[0]) == 7 && int(version[1]) < 1 ) ||
    ( int(version[0]) == 7 && int(version[1]) == 1 && int(version[2]) < 3 ) ) {
	 security_warning( 0 );
	exit(0);
}
else if ( int(version[0]) == 7 && int(version[1]) == 1 && int(version[2]) == 3 )
{
 cmd = _GetBundleVersionCmd(file:"QuickTimeStreaming.component", path:"/System/Library/Quicktime", label:"SourceVersion");
 buf = exec(cmd:cmd);
 if ( int(buf) < 4650200 ) security_warning(0);
}

VendorProductVersionCPE
applemac_os_xcpe:/o:apple:mac_os_x

7.5 High

AI Score

Confidence

Low