search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple Mac OS X TruBlueEnvironment vulnerable to buffer overflow

Vulnerability Note VU#902374

Original Release Date: 2004-03-08 | Last Revised: 2004-03-15

Overview

Apple Mac OS X contains a buffer overflow in TruBlueEnvironment which could allow a local, authenticated attacker to execute arbitrary code with root privileges.

Description

Mac OS X allows older Macintosh applications to run in an environment called Classic. TruBlueEnvironment is part of this Classic environment and is installed setuid root by default. During execution, TruBlueEnvironment fails to validate the length of an environment variable. Using a specially crafted environment variable, an authenticated local attacker could execute arbitrary code with privileges of the vulnerable process.

Impact

A local, authenticated attacker could execute arbitrary code with root privileges.

Solution

Apply Patch

Apple has released a patch to address this vulnerability. For further details, please see the Apple Security Advisory (Security Update 2004-01-26).

Vendor Information

902374
 
Affected   Unknown   Unaffected

Apple Computer Inc.

Notified:  January 26, 2004 Updated:  March 15, 2004

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please refer to the Apple Security Advisory (APPLE-SA-2004-01-26).

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Apple credits Dave G. of @stake for reporting this vulnerability.

This document was written by Damon Morda.

Other Information

CVE IDs: CVE-2004-0089
Severity Metric: 9.56
Date Public: 2004-01-28
Date First Published: 2004-03-08
Date Last Updated: 2004-03-15 18:12 UTC
Document Revision: 20

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.