sys/openbsd/stack_protector.c in libc in Apple iOS 6.1.3 and Mac OS X 10.8.x does not properly parse the Apple strings employed in the user-space stack-cookie implementation, which allows local users to bypass cookie randomization by executing a program with a call-path beginning with the stack-guard= substring, as demonstrated by an iOS untethering attack or an attack against a setuid Mac OS X program.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf - Exploit | |
References | () http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html - Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html - Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html - Vendor Advisory | |
References | () http://www.securitytracker.com/id/1033703 - | |
References | () http://www.syscan.org/index.php/sg/program/day/2 - | |
References | () https://support.apple.com/HT205212 - Vendor Advisory | |
References | () https://support.apple.com/HT205213 - Vendor Advisory | |
References | () https://support.apple.com/HT205267 - Vendor Advisory |
Information
Published : 2013-06-05 14:39
Updated : 2024-11-21 01:54
NVD link : CVE-2013-3951
Mitre link : CVE-2013-3951
CVE.ORG link : CVE-2013-3951
JSON object : View
Products Affected
apple
- mac_os_x
- iphone_os
- watchos
CWE
CWE-20
Improper Input Validation