VAR-200711-0321
Vulnerability from variot - Updated: 2025-04-10 23:03The Application Firewall in Apple Mac OS X 10.5 does not apply changed settings to processes that are started by launchd until the processes are restarted, which might allow attackers to bypass intended access restrictions. This issue may result in a false sense of security and leave certain processes vulnerable to external attack. This issue affects Mac OS X 10.5 and Mac OS X Server 10.5; earlier versions are not affected.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
TITLE: Apple Mac OS X Application Firewall Weaknesses and Security Issue
SECUNIA ADVISORY ID: SA27695
VERIFY ADVISORY: http://secunia.com/advisories/27695/
CRITICAL: Less critical
IMPACT: Security Bypass
WHERE:
From remote
OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/
DESCRIPTION: Some weaknesses and a security issue have been reported in Apple Mac OS X, which can lead to exposure of certain services.
1) The Application Firewall allows any process running as user "root" (UID 0) to receive incoming connections even though the option "Block all incoming connections" is set.
NOTE: The update changes the name of the option and updates the documentation.
2) The Application Firewall allows any process running as user "root" (UID 0) to receive incoming connections even though the executable has been added to the list of blocked applications via the "Set access for specific services and applications" option. This may lead to exposure of certain services.
Mac OS X 10.5.1 Update: http://www.apple.com/support/downloads/macosx1051update.html
Mac OS X Server 10.5.1 Update http://www.apple.com/support/downloads/macosxserver1051update.html
PROVIDED AND/OR DISCOVERED BY: J\xfcrgen Schmidt
ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307004
heise Security: http://www.heise-security.co.uk/articles/98120
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200711-0321",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mac os x",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "10.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
}
],
"sources": [
{
"db": "BID",
"id": "26459"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
},
{
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
}
],
"trust": 0.6
},
"cve": "CVE-2007-4704",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2007-4704",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-28066",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2007-4704",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2007-4704",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200711-255",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-28066",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-28066"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
},
{
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Application Firewall in Apple Mac OS X 10.5 does not apply changed settings to processes that are started by launchd until the processes are restarted, which might allow attackers to bypass intended access restrictions. \nThis issue may result in a false sense of security and leave certain processes vulnerable to external attack. \nThis issue affects Mac OS X 10.5 and Mac OS X Server 10.5; earlier versions are not affected. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nGet a free trial of the Secunia Vulnerability Intelligence Solutions:\nhttp://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv\n\n----------------------------------------------------------------------\n\nTITLE:\nApple Mac OS X Application Firewall Weaknesses and Security Issue\n\nSECUNIA ADVISORY ID:\nSA27695\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/27695/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nSome weaknesses and a security issue have been reported in Apple Mac\nOS X, which can lead to exposure of certain services. \n\n1) The Application Firewall allows any process running as user \"root\"\n(UID 0) to receive incoming connections even though the option \"Block\nall incoming connections\" is set. \n\nNOTE: The update changes the name of the option and updates the\ndocumentation. \n\n2) The Application Firewall allows any process running as user \"root\"\n(UID 0) to receive incoming connections even though the executable has\nbeen added to the list of blocked applications via the \"Set access for\nspecific services and applications\" option. This may lead to\nexposure of certain services. \n\nMac OS X 10.5.1 Update:\nhttp://www.apple.com/support/downloads/macosx1051update.html\n\nMac OS X Server 10.5.1 Update\nhttp://www.apple.com/support/downloads/macosxserver1051update.html\n\nPROVIDED AND/OR DISCOVERED BY:\nJ\\xfcrgen Schmidt\n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=307004\n\nheise Security:\nhttp://www.heise-security.co.uk/articles/98120\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-4704"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"db": "BID",
"id": "26459"
},
{
"db": "VULHUB",
"id": "VHN-28066"
},
{
"db": "PACKETSTORM",
"id": "61016"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "26459",
"trust": 2.8
},
{
"db": "NVD",
"id": "CVE-2007-4704",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "27695",
"trust": 2.6
},
{
"db": "SECTRACK",
"id": "1018958",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2007-3897",
"trust": 1.7
},
{
"db": "XF",
"id": "38492",
"trust": 1.4
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000985",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200711-255",
"trust": 0.7
},
{
"db": "APPLE",
"id": "APPLE-SA-2007-11-15",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-28066",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "61016",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-28066"
},
{
"db": "BID",
"id": "26459"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"db": "PACKETSTORM",
"id": "61016"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
},
{
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"id": "VAR-200711-0321",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-28066"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-10T23:03:33.998000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Mac OS X v10.5.1 Update",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=307004-en"
},
{
"title": "Mac OS X v10.5.1 Update",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=307004-jp"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-DesignError",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/26459"
},
{
"trust": 2.5,
"url": "http://securitytracker.com/id?1018958"
},
{
"trust": 2.1,
"url": "http://docs.info.apple.com/article.html?artnum=307004"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2007/nov/msg00004.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/27695"
},
{
"trust": 1.4,
"url": "http://www.frsirt.com/english/advisories/2007/3897"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/38492"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/3897"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38492"
},
{
"trust": 0.9,
"url": "http://secunia.com/advisories/27695/"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4704"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4704"
},
{
"trust": 0.3,
"url": "http://www.apple.com/macosx/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/macosxserver1051update.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/macosx1051update.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/96/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://www.heise-security.co.uk/articles/98120"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-28066"
},
{
"db": "BID",
"id": "26459"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"db": "PACKETSTORM",
"id": "61016"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
},
{
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-28066"
},
{
"db": "BID",
"id": "26459"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"db": "PACKETSTORM",
"id": "61016"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
},
{
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-11-15T00:00:00",
"db": "VULHUB",
"id": "VHN-28066"
},
{
"date": "2007-11-15T00:00:00",
"db": "BID",
"id": "26459"
},
{
"date": "2007-12-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"date": "2007-11-20T16:17:55",
"db": "PACKETSTORM",
"id": "61016"
},
{
"date": "2007-11-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200711-255"
},
{
"date": "2007-11-15T20:46:00",
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-29T00:00:00",
"db": "VULHUB",
"id": "VHN-28066"
},
{
"date": "2007-11-15T22:24:00",
"db": "BID",
"id": "26459"
},
{
"date": "2007-12-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000985"
},
{
"date": "2007-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200711-255"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2007-4704"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple Mac OS X Of bypassing application firewall restrictions on Windows",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000985"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "26459"
},
{
"db": "CNNVD",
"id": "CNNVD-200711-255"
}
],
"trust": 0.9
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.