DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.
References
Link | Resource |
---|---|
http://www.atstake.com/research/advisories/2003/a041003-1.txt | Vendor Advisory |
http://lists.apple.com/mhonarc/security-announce/msg00028.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2003-05-04 21:00
Updated : 2008-09-10 12:18
NVD link : CVE-2003-0171
Mitre link : CVE-2003-0171
JSON object : View
CWE
Products Affected
apple
- mac_os_x
- mac_os_x_server