First published: Thu May 06 2004(Updated: )
Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.3.3 | |
Apple Mac OS X Server | <=10.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0430 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2004-0430, upgrade to Mac OS X version 10.3.4 or later and ensure that your system is up to date with the latest security patches.
CVE-2004-0430 affects AppleFileServer in Mac OS X 10.3.3 and earlier, including Apple Mac OS X Server versions.
CVE-2004-0430 can be exploited through crafted LoginExt packets that manipulate the PathName argument to trigger a stack-based buffer overflow.
Yes, CVE-2004-0430 can be exploited remotely by attackers without physical access to the affected systems.