6.8
CVSSv2

CVE-2005-2713

Published: 31/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.1
VMScore: 685
Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

passwd in Directory Services in Mac OS X 10.3.x prior to 10.3.9 and 10.4.x prior to 10.4.5 allows local users to create arbitrary world-writable files as root by specifying an alternate file in the password database option.

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x 10.3.5

apple mac os x 10.3.6

apple mac os x 10.3.7

apple mac os x 10.4.4

apple mac os x 10.4.5

apple mac os x server 10.3.6

apple mac os x server 10.3.7

apple mac os x 10.3.3

apple mac os x 10.3.4

apple mac os x 10.4.2

apple mac os x 10.4.3

apple mac os x server 10.3.4

apple mac os x server 10.3.5

apple mac os x server 10.4.2

apple mac os x server 10.4.3

apple mac os x 10.3

apple mac os x 10.3.8

apple mac os x 10.3.9

apple mac os x server 10.3

apple mac os x server 10.3.1

apple mac os x server 10.3.8

apple mac os x server 10.3.9

apple mac os x 10.3.1

apple mac os x 10.3.2

apple mac os x 10.4

apple mac os x 10.4.1

apple mac os x server 10.3.2

apple mac os x server 10.3.3

apple mac os x server 10.4

apple mac os x server 10.4.1

apple mac os x server 10.4.4

apple mac os x server 10.4.5

Exploits

#!/usr/bin/perl # # /usr/bin/passwd[OSX]: local root exploit # # by: vade79/v9 v9@fakehalous (fakehalo/realhalo) # # (Apple) OSX's /usr/bin/passwd program has support for a custom # passwd file to be used instead of the standard/static path this # feature has security issues in the form of editable file(s) being # made anywheres on the disk a ...