CVE-2015-6996
Apple Mac OSX - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient NULL Dereference
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
IOAcceleratorFamily in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app.
IOAcceleratorFamily en Apple iOS en versiones anteriores a 9.1, OS X en versiones anteriores a 10.11.1 y watchOS en versiones anteriores a 2.0.1 permite a atacantes ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una aplicación manipulada.
IOUserClient::connectClient is an obscure IOKit method which according to the docs is supposed to "Inform a connection of a second connection." In fact IOKit provides no default implementation and only a handful of userclients actually implement it, and it's pretty much up to them to define the semantics of what "informing the connection of a second connection" actually means. One of the userclients which implements connectClient is IOAccelContext2 which is the parent of the IGAccelContext userclient family (which are the intel GPU accelerator userclients.) IOUserClient::connectClient is exposed to userspace as IOConnectAddClient.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-09-16 CVE Reserved
- 2015-10-21 CVE Published
- 2016-01-28 First Exploit
- 2024-08-06 CVE Updated
- 2024-11-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securitytracker.com/id/1033929 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/39380 | 2016-01-28 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html | 2016-12-24 | |
http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html | 2016-12-24 | |
http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html | 2016-12-24 | |
https://support.apple.com/HT205370 | 2016-12-24 | |
https://support.apple.com/HT205375 | 2016-12-24 | |
https://support.apple.com/HT205378 | 2016-12-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | <= 9.0.2 Search vendor "Apple" for product "Iphone Os" and version " <= 9.0.2" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | <= 10.11.0 Search vendor "Apple" for product "Mac Os X" and version " <= 10.11.0" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Watchos Search vendor "Apple" for product "Watchos" | <= 2.0.0 Search vendor "Apple" for product "Watchos" and version " <= 2.0.0" | - |
Affected
|