DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mac_os_x | Apple | 10.0 (including) | 10.0 (including) |
Mac_os_x | Apple | 10.0.1 (including) | 10.0.1 (including) |
Mac_os_x | Apple | 10.0.2 (including) | 10.0.2 (including) |
Mac_os_x | Apple | 10.0.3 (including) | 10.0.3 (including) |
Mac_os_x | Apple | 10.0.4 (including) | 10.0.4 (including) |
Mac_os_x | Apple | 10.1 (including) | 10.1 (including) |
Mac_os_x | Apple | 10.1.1 (including) | 10.1.1 (including) |
Mac_os_x | Apple | 10.1.2 (including) | 10.1.2 (including) |
Mac_os_x | Apple | 10.1.3 (including) | 10.1.3 (including) |
Mac_os_x | Apple | 10.1.4 (including) | 10.1.4 (including) |
Mac_os_x | Apple | 10.1.5 (including) | 10.1.5 (including) |
Mac_os_x | Apple | 10.2 (including) | 10.2 (including) |
Mac_os_x | Apple | 10.2.1 (including) | 10.2.1 (including) |
Mac_os_x | Apple | 10.2.2 (including) | 10.2.2 (including) |
Mac_os_x | Apple | 10.2.3 (including) | 10.2.3 (including) |
Mac_os_x | Apple | 10.2.4 (including) | 10.2.4 (including) |
Mac_os_x_server | Apple | 10.0 (including) | 10.0 (including) |
Mac_os_x_server | Apple | 10.2 (including) | 10.2 (including) |
Mac_os_x_server | Apple | 10.2.1 (including) | 10.2.1 (including) |
Mac_os_x_server | Apple | 10.2.2 (including) | 10.2.2 (including) |
Mac_os_x_server | Apple | 10.2.3 (including) | 10.2.3 (including) |
Mac_os_x_server | Apple | 10.2.4 (including) | 10.2.4 (including) |