AFP Server Directory Traversal

medium Nessus Plugin ID 45374

Synopsis

The remote service is vulnerable to an information disclosure attack.

Description

The remote AFP server allows guest users to read files located outside public shares by sending requests to the '..' directory.

An attacker could use this flaw to read every file on this host.

Solution

Upgrade to Mac OS X 10.6.3 or apply Security Update 2010-002.

See Also

http://support.apple.com/kb/HT4077

http://lists.apple.com/archives/security-announce/2010/Mar/msg00001.html

http://www.securityfocus.com/advisories/19364

Plugin Details

Severity: Medium

ID: 45374

File Name: afp_traversal.nasl

Version: 1.11

Type: remote

Family: Misc.

Published: 3/29/2010

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: AFP/GuestAllowed

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Patch Publication Date: 3/29/2010

Vulnerability Publication Date: 3/29/2010

Reference Information

CVE: CVE-2010-0533

BID: 39020