| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.1 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Apple Mac OS X. This vulnerability affects unknown code of the component Launch Services. Executing a manipulation can lead to information disclosure. The identification of this vulnerability is CVE-2005-3164. There is no exploit available. You should upgrade the affected component.
Details
A vulnerability classified as problematic was found in Apple Mac OS X (Operating System) (affected version not known). This vulnerability affects some unknown functionality of the component Launch Services. The manipulation with an unknown input leads to a information disclosure vulnerability. The CWE definition for the vulnerability is CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
The AJP connector in Apache Tomcat 4.0.1 through 4.0.6 and 4.1.0 through 4.1.36, as used in Hitachi Cosminexus Application Server and standalone, does not properly handle when a connection is broken before request body data is sent in a POST request, which can lead to an information leak when "unsuitable request body data" is used for a different request, possibly related to Java Servlet pages.
The bug was discovered 10/03/2005. The weakness was shared 07/01/2008 with Apple as HT2163 as confirmed advisory (Website). The advisory is available at support.apple.com. This vulnerability was named CVE-2005-3164 since 10/06/2005. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1592 by the MITRE ATT&CK project.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 3 days. During that time the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 33282 (Mac OS X Multiple Vulnerabilities (Security Update 2008-004)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family MacOS X Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 115848 (Apple Mac OS X 10.5.4 and Security Update 2008-004 Not Installed (APPLE-SA-2008-06-30)).
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at support.apple.com. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published before and not just after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (22506), Tenable (33282), SecurityFocus (BID 15003†), OSVDB (19821†) and Secunia (SA30802†). The entries VDB-3750, VDB-3753, VDB-3752 and VDB-3751 are related to this item. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
License
Support
Website
- Vendor: https://www.apple.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.1
VulDB Base Score: 5.6
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 33282
Nessus Name: Mac OS X Multiple Vulnerabilities (Security Update 2008-004)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 102032
OpenVAS Name: get_kb_item(ssh/login/osx_name
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Patch: support.apple.com
Timeline
10/03/2005 🔍10/03/2005 🔍
10/06/2005 🔍
10/06/2005 🔍
10/06/2005 🔍
06/30/2008 🔍
07/01/2008 🔍
07/01/2008 🔍
07/07/2008 🔍
07/18/2008 🔍
08/12/2019 🔍
Sources
Vendor: apple.comAdvisory: HT2163
Organization: Apple
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2005-3164 (🔍)
GCVE (CVE): GCVE-0-2005-3164
GCVE (VulDB): GCVE-100-3754
X-Force: 22506
SecurityFocus: 15003 - Hitachi Cosminexus Remote Information Disclosure Vulnerability
Secunia: 30802
OSVDB: 19821 - CVE-2005-3164 - Hitachi Cosminexus - Information Disclosure Issue
Vulnerability Center: 18735 - Hitachi Cosminexus Application Server Allows Information Leakage via HTTP Post Request, Medium
Vupen: ADV-2008-1979
scip Labs: https://www.scip.ch/en/?labs.20150108
See also: 🔍
Entry
Created: 07/18/2008 19:27Updated: 08/12/2019 10:46
Changes: 07/18/2008 19:27 (83), 08/12/2019 10:46 (7)
Complete: 🔍
Committer:
Cache ID: 216:959:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.

No comments yet. Languages: en.
Please log in to comment.