CVE-2005-0713
Published Mar 21, 2005
Last updated 16 years ago
Overview
- Description
- The Bluetooth Setup Assistant for Mac OS X before 10.3.8 can be launched without a keyboard or Bluetooth device, which allows local users to bypass access restrictions and gain privileges.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFDADE04-29F0-446B-824B-0518880CF0A0" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED9BE602-A740-4CF7-9CAF-59061B16AB31" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33E698C1-C313-40E6-BAF9-7C8F9CF02484" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "421079DA-B605-4E05-9454-C30CF7631CF4" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93B734BA-3435-40A9-B22B-5D56CEB865A7" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30897327-44DD-4D6C-B8B6-2D66C44EA55D" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B79D8F73-2E78-4A67-96BB-21AD9BCB0094" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E997653-C744-4F1F-9948-47579AB3BED3" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF5A416A-F198-4B9C-8221-D36CC8A7FE5C" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "384C130F-D1A9-4482-AF20-FC81933473A3" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CA6BD2A-3022-408D-8E4F-50865996E965" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "463D5628-7536-4029-99D6-5E525050059E" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69A39B11-1C23-4A6C-B4C5-AEC40836F173" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78D48FD1-CB91-4310-9432-A4365FA67B11" } ], "operator": "OR" } ] } ]