CVE-2013-3949

Severity

21%

Complexity

39%

Confidentiality

48%

The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, which allows local users to bypass intended access restrictions via a wrapper program that calls the posix_spawnattr_setflags function.

The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, which allows local users to bypass intended access restrictions via a wrapper program that calls the posix_spawnattr_setflags function.

CVSS 2.0 Base Score 2.1. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:P/A:N).

Overview

Type

Apple Mac OS X

First reported 11 years ago

2013-06-05 14:39:00

Last updated 11 years ago

2013-06-05 14:39:00

Affected Software

Apple Mac OS X 10.8.0

10.8.0

Apple Mac OS X 10.8.1

10.8.1

Apple Mac OS X 10.8.2

10.8.2

Apple Mac OS X 10.8.3

10.8.3

Apple Mac OS X 10.8.4

10.8.4

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.