{"vuid":"VU#464662","idnumber":"464662","name":"Apple Mac OS X vulnerable to information disclosure in \"Message-ID\" header","keywords":["Apple","Mac OS X","information disclosure","Message-ID header","GUUID"],"overview":"The Mail application supplied with Apple's Mac OS X operating system identifies the system from which any electronic mail is sent.","clean_desc":"Mac OS X includes the Mail application for handling electronic mail. This application does include the Media Access Control (MAC) address of a network interface in the Message-ID header, which discloses the system which sent the mail.","impact":"This flaw makes it possible to identify the system that has sent a given piece of electronic mail with the Mail application. An intruder may use this information, which is usually transmitted in cleartext and received on a remote system, to deduce a valid MAC address to use on a foreign network in order to gain access. This value may also be used to deduce the sender of anonymized or privatized mail.","resolution":"Apply a patch\nApple advises all users to apply Apple Security Update 2005-001, as it fixes this flaw and other critical security flaws. More information can be found at: <http://docs.info.apple.com/article.html?artnum=300770> This patch enables Mail to apply a cryptographic hash function to the GUUID and random data from /dev/random in order to create a Message-ID which does not contain identifying information.","workarounds":"","sysaffected":"","thanks":"Thanks to Apple Product Security for reporting this vulnerability. Apple, in turn, gives thanks to Carl Purvis for originally reporting this vulnerability.","author":"This document was written by Ken MacInnis.","public":["http://docs.info.apple.com/article.html?artnum=300770","http://secunia.com/advisories/14005/"],"cveids":["CVE-2005-0127"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-01-27T19:39:20Z","publicdate":"2005-01-25T00:00:00Z","datefirstpublished":"2005-01-31T19:48:33Z","dateupdated":"2005-01-31T19:48:38Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"2","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"2.8125","cam_scorecurrentwidelyknown":"3.375","cam_scorecurrentwidelyknownexploited":"5.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.8125,"vulnote":null}