{"vuid":"VU#174790","idnumber":"174790","name":"Apple Mac OS X vulnerable to privilege escalation when using Directory Services","keywords":["Apple","Mac OS X","privilege escalation","Directory Services"],"overview":"A vulnerability in Mac OS X may permit a local authenticated user with physical access to the machine to gain elevated privileges.","clean_desc":"Mac OS X permits the remote authentication of users via directory sevices lookups. When a user logs in to a machine configured to use the Directory Services to provide authentication, it is possible to disconnect the machine's network connection and potentially be logged in with a Finder running as root. This gives the user full root permissions on the machine. Applications started in the session will also run as root. This vulnerability affects Mac OS X 10.3 through 10.3.3.","impact":"A local authenticated user with physical access to the machine may be able to gain root privileges to the system.","resolution":"Apple has resolved this issue in Mac OS X 10.3.4. A free upgrade is available at http://www.apple.com/support/downloads/.","workarounds":"","sysaffected":"","thanks":"Thanks to Jim Foraker for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://docs.info.apple.com/article.html?artnum=61798","http://www.apple.com/support/downloads/","http://www.securityfocus.com/bid/10432","http://securitytracker.com/alerts/2004/May/1010330.html"],"cveids":["CVE-2004-0514"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-06-08T14:50:18Z","publicdate":"2004-05-28T00:00:00Z","datefirstpublished":"2004-06-21T14:14:37Z","dateupdated":"2004-07-21T17:04:12Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"13","cam_impact":"20","cam_easeofexploitation":"2","cam_attackeraccessrequired":"1","cam_scorecurrent":"0.24375","cam_scorecurrentwidelyknown":"0.2925","cam_scorecurrentwidelyknownexploited":"0.4875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.24375,"vulnote":null}