| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.4 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Apple Mac OS X up to 10.2.5. It has been classified as critical. This impacts an unknown function of the component IPsec Policies. Performing a manipulation results in Remote Code Execution. This vulnerability is known as CVE-2003-0242. Remote exploitation of the attack is possible. No exploit is available. Upgrading the affected component is recommended.
Details
A vulnerability, which was classified as critical, was found in Apple Mac OS X up to 10.2.5 (Operating System). This affects an unknown code block of the component IPsec Policies. The manipulation with an unknown input leads to a remote code execution vulnerability. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
IPSec in Mac OS X before 10.2.6 does not properly handle certain incoming security policies that match by port, which could allow traffic that is not explicitly allowed by the policies.
The bug was discovered 05/19/2003. The weakness was published 05/19/2003 with Apple (Website). It is possible to read the advisory at docs.info.apple.com. This vulnerability is uniquely identified as CVE-2003-0242 since 05/06/2003. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available.
Upgrading to version 10.2.6 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at apple.com. The best possible mitigation is suggested to be upgrading to the latest version. Attack attempts may be identified with Snort ID 1771.
The vulnerability is also documented in the databases at X-Force (12027), SecurityFocus (BID 7628†), OSVDB (6545†), Secunia (SA8798†) and SecurityTracker (ID 1006796†). Similar entries are available at VDB-300, VDB-418, VDB-448 and VDB-526. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.apple.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.4
VulDB Base Score: 5.6
VulDB Temp Score: 5.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Mac OS X 10.2.6
Patch: apple.com
Snort ID: 1771
Timeline
05/06/2003 🔍05/19/2003 🔍
05/19/2003 🔍
05/19/2003 🔍
05/19/2003 🔍
05/19/2003 🔍
05/19/2003 🔍
06/09/2003 🔍
04/09/2004 🔍
11/18/2024 🔍
Sources
Vendor: apple.comAdvisory: docs.info.apple.com⛔
Researcher: Vulnerability announced by Apple.
Organization: Apple
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2003-0242 (🔍)
GCVE (CVE): GCVE-0-2003-0242
GCVE (VulDB): GCVE-100-75
CERT: 🔍
X-Force: 12027 - Apple Mac OS X could allow an attacker to bypass IPSec ACLs, Medium Risk
SecurityFocus: 7628 - Apple MacOS X IPSec Policy By Port Bypass Vulnerability
Secunia: 8798 - Apple Mac OS X IPSec ACL Bypass, Less Critical
OSVDB: 6545 - Apple Mac OS X IPSec Port Rule Policy Bypass
SecurityTracker: 1006796 - Mac OS X IPSec Policy Flaw May Remote Users Bypass Access Controls
scip Labs: https://www.scip.ch/en/?labs.20150108
See also: 🔍
Entry
Created: 05/19/2003 02:00Updated: 11/18/2024 14:24
Changes: 05/19/2003 02:00 (81), 01/11/2019 12:00 (2), 03/08/2021 10:24 (2), 11/18/2024 14:24 (16)
Complete: 🔍
Cache ID: 216:714:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.