The kernel in Apple Mac OS X 10.4 through 10.4.10 does not reset the current Mach Thread Port or Thread Exception Port when executing a setuid program, which allows local users to execute arbitrary code by creating the port before launching the setuid program, then writing to the address space of the setuid process.
References
| Link | Resource |
|---|---|
| http://docs.info.apple.com/article.html?artnum=307041 | Broken Link |
| http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 | Broken Link |
| http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html | Mailing List |
| http://secunia.com/advisories/27643 | Broken Link Vendor Advisory |
| http://www.securityfocus.com/bid/26444 | Broken Link Third Party Advisory VDB Entry |
| http://www.us-cert.gov/cas/techalerts/TA07-319A.html | Broken Link Third Party Advisory US Government Resource |
| http://www.vupen.com/english/advisories/2007/3868 | Broken Link Vendor Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 | Third Party Advisory VDB Entry |
Configurations
History
09 Feb 2024, 00:35
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
| CWE | CWE-665 | |
| CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
| References | () http://docs.info.apple.com/article.html?artnum=307041 - Broken Link | |
| References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 - Broken Link | |
| References | () http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html - Mailing List | |
| References | () http://secunia.com/advisories/27643 - Broken Link, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/26444 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.us-cert.gov/cas/techalerts/TA07-319A.html - Broken Link, Third Party Advisory, US Government Resource | |
| References | () http://www.vupen.com/english/advisories/2007/3868 - Broken Link, Vendor Advisory | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 - Third Party Advisory, VDB Entry |
Information
Published : 2007-11-15 01:46
Updated : 2024-02-09 00:35
NVD link : CVE-2007-3749
Mitre link : CVE-2007-3749
CVE.ORG link : CVE-2007-3749
JSON object : View
Products Affected
apple
- mac_os_x
CWE
CWE-665
Improper Initialization
