Overview
There is a buffer overflow vulnerability in the way Apple's AppleFileServer handles certain authentication requests. This vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code.
Description
| The AppleFileServer provides Apple Filing Protocol (AFP) services for clients and servers. This protocol allows users to share files over the network. By default the AFP service is not enabled. There is a buffer overflow vulnerability in the way the AppleFileServer handles certain authentication requests. By supplying a specially crafted PathName argument during authentication, an unauthenticated, remote attacker could execute arbitrary code. According to the @stake advisory: | 
Impact
| An unauthenticated, remote attacker could execute arbitrary code. | 
Solution
| Apply Patch Apple has issued an advisory to address this issue. For further details, please see the Apple Security Advisory (Security Update 2004-05-03). | 
| Disable AppleFileServer 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by Dave G. of @stake.
This document was written by Damon Morda based on information in the @stake advisory.
Other Information
| CVE IDs: | CVE-2004-0430 | 
| Severity Metric: | 27.42 | 
| Date Public: | 2004-05-03 | 
| Date First Published: | 2004-05-07 | 
| Date Last Updated: | 2004-05-07 15:43 UTC | 
| Document Revision: | 26 |