header-logo
Suggest Exploit
vendor:
Mac OS X Server
by:
Not mentioned
7.5
CVSS
HIGH
Format String
134
CWE
Product Name: Mac OS X Server
Affected Version From: Apple Mac OS X Server 10.4.9 and prior versions
Affected Version To: Not mentioned
Patch Exists: YES
Related CWE: Not mentioned
CPE: o:apple:mac_os_x_server:10.4.9
Metasploit:
Other Scripts:
Platforms Tested:
2007

Format String Vulnerability in Apple Mac OS X VPN Service Daemon

The VPN service daemon in Apple Mac OS X is prone to a format-string vulnerability. It fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. Attackers can exploit this vulnerability to crash the application or execute arbitrary code with superuser privileges, potentially leading to a complete compromise of vulnerable computers.

Mitigation:

Apply the latest security patches provided by Apple. Ensure that the system is up to date with security updates.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/24208/info

Apple Mac OS X's VPN service daemon is prone to a format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

Attackers may exploit this issue to crash the application or execute arbitrary code with superuser privileges. Successful exploits can result in a complete compromise of vulnerable computers.

Apple Mac OS X Server 10.4.9 and prior versions are vulnerable to this issue.

This issue was originally included in BID 24144 (Apple Mac OS X 2007-005 Multiple Security Vulnerabilities), but has been given its own record. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30096.tar.gz