CVE-2006-4392

Severity

72%

Complexity

39%

Confidentiality

165%

The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.

The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.

CVSS 2.0 Base Score 7.2. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).

Overview

First reported 18 years ago

2006-10-03 04:02:00

Last updated 6 years ago

2018-10-17 21:36:00

Affected Software

Apple Mac OS X 10.4

10.4

Apple Mac OS X 10.4.1

10.4.1

Apple Mac OS X 10.4.2

10.4.2

Apple Mac OS X 10.4.3

10.4.3

Apple Mac OS X 10.4.4

10.4.4

Apple Mac OS X 10.4.5

10.4.5

Apple Mac OS X 10.4.6

10.4.6

Apple Mac OS X 10.4.7

10.4.7

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.