First published: Tue Apr 10 2007(Updated: )
fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11n before Firmware Update 7.1, and by Apple Mac OS X 10.3.9 through 10.4.9, does not properly enforce password protection of a USB hard drive, which allows context-dependent attackers to list arbitrary directories or execute arbitrary code, resulting from memory corruption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple AirPort Extreme | <=7.0 | |
Apple Mac OS X | =10.3.9 | |
Apple Mac OS X | =10.4 | |
Apple Mac OS X | =10.4.1 | |
Apple Mac OS X | =10.4.2 | |
Apple Mac OS X | =10.4.3 | |
Apple Mac OS X | =10.4.4 | |
Apple Mac OS X | =10.4.5 | |
Apple Mac OS X | =10.4.6 | |
Apple Mac OS X | =10.4.7 | |
Apple Mac OS X | =10.4.8 | |
Apple Mac OS X | =10.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0734 is classified as a medium severity vulnerability due to its potential for unauthorized access to USB hard drives.
To address CVE-2007-0734, it is recommended to update to AirPort Extreme Firmware Update 7.1 or later, or upgrade to a non-vulnerable version of Mac OS X.
CVE-2007-0734 affects AirPort Extreme Base Station devices running firmware versions prior to 7.1 and Mac OS X versions from 10.3.9 through 10.4.9.
CVE-2007-0734 allows context-dependent attackers to list arbitrary directories on a vulnerable USB hard drive due to insufficient password protection.
Yes, Mac OS X versions later than 10.4.9 are not affected by CVE-2007-0734.