{"vuid":"VU#945747","idnumber":"945747","name":"Mac OS X executes 'recent items' with privileges of foreground application","keywords":["Mac OS X","recent items","root privileges","suid root"],"overview":"The \"recent items\" feature of MacOS X  allows users at the console to trivially obtain root privileges.","clean_desc":"MacOS X includes a feature called recent items. Recent Items is a list of documents and applications that have recently been accessed. An application launched from the Recent Items list runs with the privileges of the foreground application, not the privilege of the console user. This enables a trivial exploit to gain root access from the console.","impact":"Attackers with access to the console (i.e. logged in at the desktop, not remotely) can gain root access.","resolution":"Use the Software Update feature of MacOS X to install the security update dated 10-19-2001.","workarounds":"","sysaffected":"","thanks":"Our thanks to Ben Crosby and César Valencia who reported this problem to us. Additionally, we thank Scott Anguish for his \narticle\n on \nStepwise.com","author":"This document was written by Shawn V. Hernan.","public":["http://www.stepwise.com/Articles/Admin/2001-10-15.01.html","http://www.apple.com/support/security/security_updates.html","http://www.securityfocus.com/bid/3439","http://www.ciac.org/ciac/bulletins/m-007.shtml"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-10-17T13:23:48Z","publicdate":"2001-10-18T00:00:00Z","datefirstpublished":"2001-11-05T19:48:18Z","dateupdated":"2001-11-05T19:48:21Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"3","cam_population":"5","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"10.5","cam_scorecurrentwidelyknown":"12.375","cam_scorecurrentwidelyknownexploited":"16.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.5,"vulnote":null}