CVE-2007-3749

The kernel in Apple Mac OS X 10.4 through 10.4.10 does not reset the current Mach Thread Port or Thread Exception Port when executing a setuid program, which allows local users to execute arbitrary code by creating the port before launching the setuid program, then writing to the address space of the setuid process.
Configurations

Configuration 1 (hide)

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

History

09 Feb 2024, 00:35

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-665
References () http://docs.info.apple.com/article.html?artnum=307041 - () http://docs.info.apple.com/article.html?artnum=307041 - Broken Link
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 - Broken Link
References () http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html - () http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html - Mailing List
References () http://secunia.com/advisories/27643 - Vendor Advisory () http://secunia.com/advisories/27643 - Broken Link, Vendor Advisory
References () http://www.securityfocus.com/bid/26444 - () http://www.securityfocus.com/bid/26444 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA07-319A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-319A.html - Broken Link, Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2007/3868 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/3868 - Broken Link, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 - Third Party Advisory, VDB Entry
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8
CPE cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Information

Published : 2007-11-15 01:46

Updated : 2024-02-09 00:35


NVD link : CVE-2007-3749

Mitre link : CVE-2007-3749

CVE.ORG link : CVE-2007-3749


JSON object : View

Products Affected

apple

  • mac_os_x
CWE
CWE-665

Improper Initialization