{"vuid":"VU#648406","idnumber":"648406","name":"Apple Mac OS X AppleFileServer fails to properly handle certain authentication requests","keywords":["Apple","Mac OS X","AppleFileServer","AFP","buffer overflow","LoginExt","PathName","Cleartext Password User Authentication Method","UAM","AFPName","arbitrary code execution"],"overview":"There is a buffer overflow vulnerability in the way Apple's AppleFileServer handles certain authentication requests. This vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code.","clean_desc":"The AppleFileServer provides Apple Filing Protocol (AFP) services for clients and servers. This protocol allows users to share files over the network. By default the AFP service is not enabled. There is a buffer overflow vulnerability in the way the AppleFileServer handles certain authentication requests. By supplying a specially crafted PathName argument during authentication, an unauthenticated, remote attacker could execute arbitrary code. According to the @stake advisory: There is a pre-authentication, remotely exploitable stack buffer overflow that allows an attacker to obtain administrative privileges. The overflow occurs when parsing the PathName argument from LoginExt packet requesting authentication using the Cleartext Password User Authentication Method (UAM). The PathName argument is encoded as one-byte specifying the string type, two-bytes specifying the string length, and finally the string itself. A string of type AFPName (0x3) that is longer than the length declared in the packet will overflow the fixed-size stack buffer.","impact":"An unauthenticated, remote attacker could execute arbitrary code.","resolution":"Apply Patch\nApple has issued an advisory to address this issue. For further details, please see the Apple Security Advisory (Security Update 2004-05-03).","workarounds":"Disable AppleFileServer Until a patch can be applied, you may wish to disable the AppleFileServer.","sysaffected":"","thanks":"This vulnerability was reported by Dave G. of \n@stake","author":"This document was written by Damon Morda based on information in the @stake advisory.","public":["http://www.atstake.com/research/advisories/2004/a050304-1.txt","http://docs.info.apple.com/article.html?artnum=61798","http://secunia.com/advisories/11539/","http://www.securiteam.com/securitynews/5QP0115CUO.html","http://www.securitytracker.com/alerts/2004/May/1010039.html2"],"cveids":["CVE-2004-0430"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-05-04T17:28:40Z","publicdate":"2004-05-03T00:00:00Z","datefirstpublished":"2004-05-07T14:48:38Z","dateupdated":"2004-05-07T15:43:16Z","revision":26,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"13","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"27.421875","cam_scorecurrentwidelyknown":"32.90625","cam_scorecurrentwidelyknownexploited":"54.84375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":27.421875,"vulnote":null}