Current Description

DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.

Basic Data

PublishedMay 05, 2003
Last ModifiedSeptember 10, 2008
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSAppleMac Os X10.0*******
    2.3OSAppleMac Os X10.0.1*******
    2.3OSAppleMac Os X10.0.2*******
    2.3OSAppleMac Os X10.0.3*******
    2.3OSAppleMac Os X10.0.4*******
    2.3OSAppleMac Os X10.1*******
    2.3OSAppleMac Os X10.1.1*******
    2.3OSAppleMac Os X10.1.2*******
    2.3OSAppleMac Os X10.1.3*******
    2.3OSAppleMac Os X10.1.4*******
    2.3OSAppleMac Os X10.1.5*******
    2.3OSAppleMac Os X10.2*******
    2.3OSAppleMac Os X10.2.1*******
    2.3OSAppleMac Os X10.2.2*******
    2.3OSAppleMac Os X10.2.3*******
    2.3OSAppleMac Os X10.2.4*******
    2.3OSAppleMac Os X Server10.0*******
    2.3OSAppleMac Os X Server10.2*******
    2.3OSAppleMac Os X Server10.2.1*******
    2.3OSAppleMac Os X Server10.2.2*******
    2.3OSAppleMac Os X Server10.2.3*******
    2.3OSAppleMac Os X Server10.2.4*******

Vulnerable Software List

Apple Mac Os X Server 10.0, 10.2, 10.2.1, 10.2.2, 10.2.3, 10.2.4
Apple Mac Os X 10.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4, 10.1, 10.1.1, 10.1.2, 10.1.3, 10.1.4, 10.1.5, 10.2, 10.2.1, 10.2.2, 10.2.3, 10.2.4


A041003-1 Advisory