{"vuid":"VU#681056","idnumber":"681056","name":"Apple Mac OS X CFNetwork may allow arbitrary FTP commands to be executed via a crafted FTP URI","keywords":["Apple","Mac","OS X","CFNetwork","arbitrary FTP","crafted FTP URI","apple-2006-007"],"overview":"Apple Mac OS X CFNetwork may allow arbitrary FTP commands to be executed via a crafted FTP URI.","clean_desc":"According to Apple Security Update 2006-007: By enticing a user to access a maliciously crafted FTP URI, an attacker can cause the user's FTP client to issue arbitrary FTP commands to any accessible FTP server, using the credentials of the victim. This issue may also facilitate attacks of other line oriented protocols, such as SMTP.","impact":"By convincing a user to open a specially crafted web page or click a link, a remote, unauthenticated attacker may be able to execute arbitrary FTP commands.","resolution":"Apply Apple Updates\nThis issue is addressed by Apple Security Update 2006-007.","workarounds":"","sysaffected":"","thanks":"This issue was reported in Apple Security Update \n2006-007","author":"This document was written by Chris Taschner.","public":["http://docs.info.apple.com/article.html?artnum=304829","http://secunia.com/advisories/23155/"],"cveids":["CVE-2006-4401"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-29T13:15:20Z","publicdate":"2006-11-28T00:00:00Z","datefirstpublished":"2006-11-30T15:47:31Z","dateupdated":"2006-12-01T21:56:48Z","revision":12,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.55","cam_scorecurrentwidelyknown":"27","cam_scorecurrentwidelyknownexploited":"54","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.55,"vulnote":null}