{"vuid":"VU#704110","idnumber":"704110","name":"Apple Mac OS X CoreFoundation CFPlugIn facilities automatically load plug-in executables","keywords":["Apple","Mac OSX","CoreFoundation","CFPlugIn","privilege escalation","specially crafted bundle"],"overview":"There is a vulnerability in the Mac OS X CoreFoundation framework that could allow a local attacker to gain elevated privileges.","clean_desc":"The Core Foundation framework (CoreFoundation.framework) is designed to allow code and data sharing between frameworks, libraries, and applications in different environments and layers. It includes the CFPlugIn, which provides a standard architecture for application extensions. There is a vulnerability in the way CoreFoundation loads user-supplied libraries for applications using the CFPlugIn facilities.","impact":"An authenticated local attacker could cause an application using the CoreFoundation CFPlugIn facilities to load a user-supplied library. Exploitation of this vulnerability on privileged applications could allow an attacker to gain elevated privileges.","resolution":"Apple has released a patch to address this vulnerability. For further details, please see the Apple Security Advisory (Security Update 2004-09-07).","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Apple.","author":"This document was written by Damon Morda based on information provided by Apple.","public":["http://docs.info.apple.com/article.html?artnum=61798","http://developer.apple.com/documentation/MacOSX/Conceptual/SystemOverview/SystemArchitecture/chapter_3_section_7.html","http://developer.apple.com/documentation/CoreFoundation/Reference/CFPlugInRef/Reference/Introduction.html","http://secunia.com/advisories/12491/","http://www.securitytracker.com/alerts/2004/Sep/1011174.html"],"cveids":["CVE-2004-0821"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-08T13:06:02Z","publicdate":"2004-09-08T00:00:00Z","datefirstpublished":"2004-09-09T16:58:39Z","dateupdated":"2004-09-09T21:06:01Z","revision":20,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"7","cam_attackeraccessrequired":"10","cam_scorecurrent":"5.90625","cam_scorecurrentwidelyknown":"7.3828125","cam_scorecurrentwidelyknownexploited":"13.2890625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.90625,"vulnote":null}