Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Format String Vulnerability in Apple Mac OS X VPN Service Daemon - exploit.company
header-logo
Suggest Exploit
vendor:
Mac OS X Server
by:
Not mentioned
7.5
CVSS
HIGH
Format String
134
CWE
Product Name: Mac OS X Server
Affected Version From: Apple Mac OS X Server 10.4.9 and prior versions
Affected Version To: Not mentioned
Patch Exists: YES
Related CWE: Not mentioned
CPE: o:apple:mac_os_x_server:10.4.9
Metasploit:
Other Scripts:
Platforms Tested:
2007

Format String Vulnerability in Apple Mac OS X VPN Service Daemon

The VPN service daemon in Apple Mac OS X is prone to a format-string vulnerability. It fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. Attackers can exploit this vulnerability to crash the application or execute arbitrary code with superuser privileges, potentially leading to a complete compromise of vulnerable computers.

Mitigation:

Apply the latest security patches provided by Apple. Ensure that the system is up to date with security updates.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/24208/info

Apple Mac OS X's VPN service daemon is prone to a format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

Attackers may exploit this issue to crash the application or execute arbitrary code with superuser privileges. Successful exploits can result in a complete compromise of vulnerable computers.

Apple Mac OS X Server 10.4.9 and prior versions are vulnerable to this issue.

This issue was originally included in BID 24144 (Apple Mac OS X 2007-005 Multiple Security Vulnerabilities), but has been given its own record. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30096.tar.gz