CWE
16
Advisory Published
Updated

CVE-2007-4687

First published: Thu Nov 15 2007(Updated: )

The remote_cmds component in Apple Mac OS X 10.4 through 10.4.10 contains a symbolic link from the tftpboot private directory to the root directory, which allows tftpd users to escape the private directory and access arbitrary files.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
macOS Yosemite=10.4.3
Apple Mac OS X Server=10.4.3
Apple Mac OS X Server=10.4.10
Apple Mac OS X Server=10.4.9
macOS Yosemite=10.4.1
Apple Mac OS X Server=10.4.2
Apple Mac OS X Server=10.4.4
macOS Yosemite=10.4.10
Apple Mac OS X Server=10.4.1
macOS Yosemite=10.4.9
macOS Yosemite=10.4.7
macOS Yosemite=10.4.4
Apple Mac OS X Server=10.4.5
Apple Mac OS X Server=10.4.6
Apple Mac OS X Server=10.4.8
macOS Yosemite=10.4.6
macOS Yosemite=10.4.5
macOS Yosemite=10.4.8
Apple Mac OS X Server=10.4.7
macOS Yosemite=10.4.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2007-4687?

    CVE-2007-4687 is classified as a medium severity vulnerability due to its potential to allow unauthorized access to sensitive files.

  • How do I fix CVE-2007-4687?

    To remediate CVE-2007-4687, it is recommended to secure the symbolic link or update to a patched version of Mac OS X that addresses this vulnerability.

  • What impact does CVE-2007-4687 have on my system?

    CVE-2007-4687 allows tftpd users to escape the tftpboot private directory, potentially accessing arbitrary files on the system.

  • Which versions of Mac OS X are affected by CVE-2007-4687?

    CVE-2007-4687 affects Apple Mac OS X versions from 10.4 through 10.4.10.

  • Is there a workaround for CVE-2007-4687?

    Currently, no specific workaround is recommended for CVE-2007-4687 besides ensuring that the system is updated with the latest security patches.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203