{"vuid":"VU#913820","idnumber":"913820","name":"Apple Mac OS X Directory Services contains a buffer overflow","keywords":["Apple","Mac OS X","Directory Services","buffer overflow","arbitrary code execution handling of authentication","apple_security_update_2005_007"],"overview":"A buffer overflow in Apple Mac OS X Directory Service's authentication process may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Apple Mac OS X Server Directory Service provides reading, writing, and authentication services within the Apple Open Directory Architecture. A buffer overflow exists in the authentication process used by Apple Directory Service. A buffer within an unspecified routine used by the authentication process can be overwritten via a specially crafted authentication request. For more information, please refer to Apple Security Update 2005-007.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the Apple Directory Service's authentication process.","resolution":"Apple a patch\nApple advises all users to apply Apple Security Update 2005-007, as it fixes this and other critical security flaws.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Apple Security Update 2005-007","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/16449/","http://docs.info.apple.com/article.html?artnum=302163"],"cveids":["CVE-2005-2507"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-08-16T19:03:21Z","publicdate":"2005-08-15T00:00:00Z","datefirstpublished":"2005-08-17T14:58:46Z","dateupdated":"2005-08-17T17:13:05Z","revision":30,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"10","cam_attackeraccessrequired":"17","cam_scorecurrent":"18.16875","cam_scorecurrentwidelyknown":"22.7109375","cam_scorecurrentwidelyknownexploited":"40.8796875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.16875,"vulnote":null}