The kernel in Apple Mac OS X 10.4 through 10.4.10 does not reset the current Mach Thread Port or Thread Exception Port when executing a setuid program, which allows local users to execute arbitrary code by creating the port before launching the setuid program, then writing to the address space of the setuid process.
References
Configurations
History
21 Nov 2024, 00:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.info.apple.com/article.html?artnum=307041 - Broken Link | |
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html - Mailing List | |
References | () http://secunia.com/advisories/27643 - Broken Link, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/26444 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA07-319A.html - Broken Link, Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2007/3868 - Broken Link, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 - Third Party Advisory, VDB Entry |
09 Feb 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | (APPLE) http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html - Mailing List | |
References | (BID) http://www.securityfocus.com/bid/26444 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://docs.info.apple.com/article.html?artnum=307041 - Broken Link | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA07-319A.html - Broken Link, Third Party Advisory, US Government Resource | |
References | (IDEFENSE) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 - Broken Link | |
References | (VUPEN) http://www.vupen.com/english/advisories/2007/3868 - Broken Link, Vendor Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/27643 - Broken Link, Vendor Advisory | |
CWE | CWE-665 | |
CPE | cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:* |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
Information
Published : 2007-11-15 01:46
Updated : 2024-11-21 00:33
NVD link : CVE-2007-3749
Mitre link : CVE-2007-3749
CVE.ORG link : CVE-2007-3749
JSON object : View
Products Affected
apple
- mac_os_x
CWE
CWE-665
Improper Initialization