header-logo
Suggest Exploit
vendor:
MacOS X
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Code Execution
284
CWE
Product Name: MacOS X
Affected Version From: MacOS X 10.0
Affected Version To: MacOS X 10.2
Patch Exists: NO
Related CWE: N/A
CPE: o:apple:mac_os_x
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: MacOS X
2002

MacOS X SoftwareUpdate Vulnerability

A vulnerability has been reported for MacOS X where an attacker may use SoftwareUpdate to install malicious software on the vulnerable system. SoftwareUpdate uses HTTP, without any authentication, to obtain updates from Apple. Any updated packages are installed on the system as the root user. In order to exploit this vulnerability, the attacker must control the machine located at swquery.apple.com, from the perspective of the vulnerable client. It may be possible to create this condition through some known techniques, including DNS cache poisoning and DNS spoofing.

Mitigation:

Ensure that the SoftwareUpdate service is not accessible from the Internet, and that DNS spoofing and cache poisoning attacks are prevented.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/5176/info

A vulnerability has been reported for MacOS X where an attacker may use SoftwareUpdate to install malicious software on the vulnerable system. SoftwareUpdate uses HTTP, without any authentication, to obtain updates from Apple. Any updated packages are installed on the system as the root user.

In order to exploit this vulnerability, the attacker must control the machine located at swquery.apple.com, from the perspective of the vulnerable client. It may be possible to create this condition through some known techniques, including DNS cache poisoning and DNS spoofing.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21596.tgz.tar