Overview
There is a buffer overflow vulnerability in the way Apple's AppleFileServer handles certain authentication requests. This vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code.
Description
The AppleFileServer provides Apple Filing Protocol (AFP) services for clients and servers. This protocol allows users to share files over the network. By default the AFP service is not enabled. There is a buffer overflow vulnerability in the way the AppleFileServer handles certain authentication requests. By supplying a specially crafted PathName argument during authentication, an unauthenticated, remote attacker could execute arbitrary code. According to the @stake advisory: |
Impact
An unauthenticated, remote attacker could execute arbitrary code. |
Solution
Apply Patch Apple has issued an advisory to address this issue. For further details, please see the Apple Security Advisory (Security Update 2004-05-03). |
Disable AppleFileServer
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Dave G. of @stake.
This document was written by Damon Morda based on information in the @stake advisory.
Other Information
CVE IDs: | CVE-2004-0430 |
Severity Metric: | 27.42 |
Date Public: | 2004-05-03 |
Date First Published: | 2004-05-07 |
Date Last Updated: | 2004-05-07 15:43 UTC |
Document Revision: | 26 |