Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> MacOS X Local Security Checks >> Mac OS X < 10.4


Vulnerability Assessment Details

Mac OS X < 10.4

Vulnerability Assessment Summary
Check for the version of Mac OS X

Detailed Explanation for this Vulnerability Assessment

The remote host is running a version of Mac OS X which is older than
version 10.4.

Versions older than 10.4 contain a security issue in the way they handle
the permissions of pseudo terminals.

When an application uses a new pseudo terminal, it can not restrict its
permissions to a safe mode. As a result, every created pseudo terminal
has permissions 0666 set, which permits a local attacker to sniff the session
of other users.

Solution : Upgrade to Mac OS X
See also : http://www.securityfocus.com/archive/1/397306
Network Security Threat Level: Medium

Networks Security ID: 13467

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

7 ft RJ45 CAT5 LAN Network Cable Ethernet Router Switch Patch Cord Orange Lot 10
$13.59
7 ft RJ45 CAT5 LAN Network Cable Ethernet Router Switch Patch Cord Orange Lot 10 pictureCisco SG300-52 52-Port Desktop Switch SRW2048-K9 V02
$200.0
Cisco SG300-52 52-Port Desktop Switch SRW2048-K9 V02 pictureCisco Catalyst 2960 Series Compact Switch, WS-C2960-8TC-S
$145.95
Cisco Catalyst 2960 Series Compact Switch, WS-C2960-8TC-S pictureHP J9794A 1405-8G V2 Unmanaged 8-Port Gigabit Switch w/ Power Supply
$49.95
HP J9794A 1405-8G V2 Unmanaged 8-Port Gigabit Switch w/ Power Supply picture


Discussions

No Discussions have been posted on this vulnerability.