CVE-2006-4392
Apple Mac OSX 10.4.7 - Mach Exception Handling Local (10.3.x)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.
El núcleo Mach, usado en sistemas operativos que incluyen (1) Mac OS X 10.4 hata 10.4.7 y (2) OpenStep anterior a 4.2, permite a usuarios locales escalar privilegios mediante un proceso padre que fuerza una excepción en un hijo con setuid activado y usa puertos de excepción de Mach para modificar el contexto de hilo y el espacio de dierccionamiento de tarea del hijo de forma que provoca que el hijo llame a una función controlada por el padre.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-08-28 CVE Reserved
- 2006-09-30 First Exploit
- 2006-10-02 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/1663 | Third Party Advisory | |
http://securitytracker.com/id?1016954 | Vdb Entry | |
http://www.kb.cert.org/vuls/id/838404 | Third Party Advisory | |
http://www.osvdb.org/29269 | Vdb Entry | |
http://www.securityfocus.com/archive/1/447396/100/0/threaded | Mailing List | |
http://www.us-cert.gov/cas/techalerts/TA06-275A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2006/3852 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29281 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/2464 | 2006-09-30 | |
https://www.exploit-db.com/exploits/2463 | 2006-09-30 |
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html | 2018-10-17 | |
http://secunia.com/advisories/22187 | 2018-10-17 | |
http://www.securityfocus.com/bid/20271 | 2018-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4 Search vendor "Apple" for product "Mac Os X" and version "10.4" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.1 Search vendor "Apple" for product "Mac Os X" and version "10.4.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.2 Search vendor "Apple" for product "Mac Os X" and version "10.4.2" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.3 Search vendor "Apple" for product "Mac Os X" and version "10.4.3" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.4 Search vendor "Apple" for product "Mac Os X" and version "10.4.4" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.5 Search vendor "Apple" for product "Mac Os X" and version "10.4.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.6 Search vendor "Apple" for product "Mac Os X" and version "10.4.6" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.7 Search vendor "Apple" for product "Mac Os X" and version "10.4.7" | - |
Affected
| ||||||
Next Search vendor "Next" | Openstep Search vendor "Next" for product "Openstep" | 4.1 Search vendor "Next" for product "Openstep" and version "4.1" | - |
Affected
|