{"vuid":"VU#706838","idnumber":"706838","name":"Apple Mac OS X vulnerable to buffer overflow via vpnd daemon","keywords":["Apple","Mac OS X","buffer overflow","vpnd","apple_security_update_2005_005"],"overview":"Apple Mac OS X contains a buffer overflow in vpnd that could allow a local, authenticated attacker to execute arbitrary code with root privileges.","clean_desc":"Mac OS X includes a VPN server called vpnd, which is installed setuid root by default. vpnd fails to validate the length of the Server_id parameter. The Server_id setting may be configured from the command line by using the -i option. Server_id is referenced by the com.apple.RemoteAccessServers.plist file in the /Library/Preferences/SystemConfiguration directory to load the appropriate configuration file. Using a specially crafted Server_id parameter, an authenticated local attacker could execute arbitrary code with privileges of the vpnd process. Note that com.apple.RemoteAccessServers.plist is only present by default on Mac OS X Server. On a standard Mac OS X install, the file must be created manually or by using the graphical network configuration tools.","impact":"A local, authenticated attacker could execute arbitrary code with root privileges.","resolution":"Apply a patch\nApple advises all users to apply Apple Security Update 2005-005, which fixes this flaw and other critical security flaws.","workarounds":"Workarounds Disallow non-root access to vpnd Clear the execute bit of the vpnd binary for non-root users.","sysaffected":"","thanks":"This vulnerability was reported by Jason Aras.","author":"This document was written by Will Dormann, based on the information provided in the iDEFENSE Security Advisory 05.04.05 .","public":["http://docs.info.apple.com/article.html?artnum=301528","http://secunia.com/advisories/15227/","http://www.idefense.com/application/poi/display?id=240&type=vulnerabilities","http://www.securityfocus.org/bid/13488","http://www.securitytracker.com/alerts/2005/May/1013887.html","http://www.osvdb.org/displayvuln.php?osvdb_id=16085"],"cveids":["CVE-2005-1343"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-04T17:24:37Z","publicdate":"2005-05-03T00:00:00Z","datefirstpublished":"2005-05-16T14:52:14Z","dateupdated":"2005-05-24T13:37:53Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"9.375","cam_scorecurrentwidelyknown":"11.25","cam_scorecurrentwidelyknownexploited":"18.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.375,"vulnote":null}