First published: Thu Oct 24 2013(Updated: )
Format string vulnerability in Screen Sharing Server in Apple Mac OS X before 10.9 and Apple Remote Desktop before 3.5.4 allows remote attackers to execute arbitrary code via format string specifiers in a VNC username.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Remote Desktop | <=3.5.3 | |
Apple Remote Desktop | =3.0.0 | |
Apple Remote Desktop | =3.1 | |
Apple Remote Desktop | =3.2 | |
Apple Remote Desktop | =3.2.1 | |
Apple Remote Desktop | =3.2.2 | |
Apple Remote Desktop | =3.3 | |
Apple Remote Desktop | =3.3.1 | |
Apple Remote Desktop | =3.3.2 | |
Apple Remote Desktop | =3.4 | |
Apple Remote Desktop | =3.5 | |
Apple Remote Desktop | =3.5.1 | |
Apple Remote Desktop | =3.5.2 | |
macOS Yosemite | <=10.8.5 | |
macOS Yosemite | =10.8.0 | |
macOS Yosemite | =10.8.1 | |
macOS Yosemite | =10.8.2 | |
macOS Yosemite | =10.8.3 | |
macOS Yosemite | =10.8.4 | |
macOS Yosemite | =10.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5135 is classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2013-5135, upgrade to the latest version of Apple Remote Desktop or apply any security patches provided by Apple.
CVE-2013-5135 affects versions of Apple Remote Desktop up to 3.5.3 and Mac OS X versions prior to 10.9.
The primary risk of CVE-2013-5135 is that attackers can execute arbitrary code remotely on vulnerable systems.
Disabling Screen Sharing in the system preferences can temporarily mitigate the risk of CVE-2013-5135 until it is patched.