{"vuid":"VU#331694","idnumber":"331694","name":"Apple Mac OS X chpass/chfn/chsh utilities do not properly validate external programs","keywords":["Directory Services","Mac OS X","privilege escalation","chfn/chpass/chsh","arbitrary code execution","apple_security_update_2005_005"],"overview":"Apple Mac OS X Directory Service utilities use external programs insecurely, potentially allowing an attacker to execute arbitrary code.","clean_desc":"The OS X Directory Services have three utilities chpass, chfn, and chsh to update information in the user database, such as user name, password, shell, group affiliation, home directory, etc. When these utilities are executed, certain code paths may invoke separate, external programs in an insecure manner. A local attacker may be able to manipulate the calls to external programs made by chpass/chfn/chsh to execute arbitrary code. Note that chpass, chfn, and chsh are the same utility. In addition, this utility can execute with administrative privileges, possibly root. Please refer to Apple Security update 2005-005 for more information.","impact":"An attacker may be able to execute arbitrary code to gain elevated privileges, possibly root.","resolution":"Apply Update Apple has released Apple Security update 2005-005 to correct this issue.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Apple Product Security.","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/15227/","http://xforce.iss.net/xforce/xfdb/20376","http://docs.info.apple.com/article.html?artnum=301528","http://www.apple.com/server/macosx/","http://www.osvdb.org/16075"],"cveids":["CVE-2005-1335"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-04T16:22:38Z","publicdate":"2005-05-03T00:00:00Z","datefirstpublished":"2005-05-16T14:29:02Z","dateupdated":"2005-05-25T13:30:12Z","revision":97,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"20","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"15.9375","cam_scorecurrentwidelyknown":"19.125","cam_scorecurrentwidelyknownexploited":"31.875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":15.9375,"vulnote":null}