Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> MacOS X Local Security Checks >> Mac OS X < 10.4


Vulnerability Assessment Details

Mac OS X < 10.4

Vulnerability Assessment Summary
Check for the version of Mac OS X

Detailed Explanation for this Vulnerability Assessment

The remote host is running a version of Mac OS X which is older than
version 10.4.

Versions older than 10.4 contain a security issue in the way they handle
the permissions of pseudo terminals.

When an application uses a new pseudo terminal, it can not restrict its
permissions to a safe mode. As a result, every created pseudo terminal
has permissions 0666 set, which permits a local attacker to sniff the session
of other users.

Solution : Upgrade to Mac OS X
See also : http://www.securityfocus.com/archive/1/397306
Network Security Threat Level: Medium

Networks Security ID: 13467

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HPE PROLIANT BL460C G9 GEN9 SERVER E5-2683V3 2.0GHZ 16GB LRDIMM 300GB 15K SAS
$1319.0
HPE PROLIANT BL460C G9 GEN9 SERVER E5-2683V3 2.0GHZ 16GB LRDIMM 300GB 15K SAS pictureHPE PROLIANT BL460C G9 GEN9 SERVER E5-2603V3 1.6GHZ 48GB 2 X 3.84TB SSD
$3339.0
HPE PROLIANT BL460C G9 GEN9 SERVER E5-2603V3 1.6GHZ 48GB 2 X 3.84TB SSD pictureNVIDIA Tesla P6 16GB GDDR5 90W MXM Blade Servers Pascal GPU Accelerator Card
$2000.0
NVIDIA Tesla P6 16GB GDDR5 90W MXM Blade Servers Pascal GPU Accelerator Card pictureDELL POWEREDGE M630 E5-2698V3 2.3GHZ 128GB 480GB SSD H730
$3269.0
DELL POWEREDGE M630 E5-2698V3 2.3GHZ 128GB 480GB SSD H730 picture


Discussions

No Discussions have been posted on this vulnerability.