Show plain JSON{"id": "CVE-2010-0545", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.4, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-06-17T16:30:01.437", "references": [{"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html", "tags": ["Vendor Advisory"], "source": "product-security@apple.com"}, {"url": "http://secunia.com/advisories/40220", "tags": ["Vendor Advisory"], "source": "product-security@apple.com"}, {"url": "http://securitytracker.com/id?1024103", "source": "product-security@apple.com"}, {"url": "http://support.apple.com/kb/HT4188", "tags": ["Patch", "Vendor Advisory"], "source": "product-security@apple.com"}, {"url": "http://www.securityfocus.com/bid/40871", "tags": ["Patch"], "source": "product-security@apple.com"}, {"url": "http://www.vupen.com/english/advisories/2010/1481", "tags": ["Patch", "Vendor Advisory"], "source": "product-security@apple.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The Finder in DesktopServices in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, does not set the expected file ownerships during an \"Apply to enclosed items\" action, which allows local users to bypass intended access restrictions via normal filesystem operations."}, {"lang": "es", "value": "El buscador de DesktopServices en Apple Mac OS X v10.5.8 y v10.6 antes de v10.6.4, no asigna un propietario a los archivos durante una acci\u00f3n \"Aplicar a los elementos incluidos\", lo que permite eludir las restricciones de acceso a usuarios locales a trav\u00e9s de operaciones normales de sistema de ficheros."}], "lastModified": "2010-06-17T16:30:01.437", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1335E35A-D381-4056-9E78-37BC6DF8AD98"}, {"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A"}, {"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D"}, {"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C"}, {"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470"}, {"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82B4CD59-9F37-4EF0-BA43-427CFD6E1329"}, {"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25"}, {"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531"}, {"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93"}, {"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12"}], "operator": "OR"}]}], "sourceIdentifier": "product-security@apple.com"}