5.1
CVSSv2

CVE-2004-0430

Published: 07/07/2004 Updated: 11/07/2017
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 525
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and previous versions allows remote malicious users to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x server

apple mac os x

Exploits

#!/usr/bin/perl # Priv8security com remote root exploit for AppleFileServer # PUBLIC VERSION!!!! # # Bug found by Dave G and Dino Dai Zovi # URL: wwwatstakecom/research/advisories/2004/a050304-1txt # # [wsxz@localhost buffer]$ perl priv8afppl -h 10412199 -t 0 # -=[Priv8securitycom Apple File Server remote root exploit!]=- # # [+] ...
## # $Id: loginextrb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasp ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include M ...