First published: Tue Apr 15 2003(Updated: )
DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | =10.2.2 | |
Apple Mac OS X | =10.0.2 | |
Apple Mac OS X Server | =10.2.4 | |
Apple Mac OS X | =10.2.1 | |
Apple Mac OS X | =10.1 | |
Apple Mac OS X | =10.0.1 | |
Apple Mac OS X Server | =10.2.3 | |
Apple Mac OS X | =10.0.3 | |
Apple Mac OS X | =10.1.4 | |
Apple Mac OS X | =10.0.4 | |
Apple Mac OS X | =10.2 | |
Apple Mac OS X | =10.2.2 | |
Apple Mac OS X Server | =10.2.1 | |
Apple Mac OS X | =10.1.1 | |
Apple Mac OS X | =10.1.2 | |
Apple Mac OS X | =10.1.3 | |
Apple Mac OS X | =10.0 | |
Apple Mac OS X | =10.2.3 | |
Apple Mac OS X | =10.2.4 | |
Apple Mac OS X Server | =10.0 | |
Apple Mac OS X Server | =10.2 | |
Apple Mac OS X | =10.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.