CVE-2007-3749

HIGH

Description

The kernel in Apple Mac OS X 10.4 through 10.4.10 does not reset the current Mach Thread Port or Thread Exception Port when executing a setuid program, which allows local users to execute arbitrary code by creating the port before launching the setuid program, then writing to the address space of the setuid process.

References

http://docs.info.apple.com/article.html?artnum=307041

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630

http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html

http://secunia.com/advisories/27643

http://www.securityfocus.com/bid/26444

http://www.us-cert.gov/cas/techalerts/TA07-319A.html

http://www.vupen.com/english/advisories/2007/3868

https://exchange.xforce.ibmcloud.com/vulnerabilities/38466

Details

Source: MITRE

Published: 2007-11-15

Updated: 2017-07-29

Risk Information

CVSS v2.0

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (2 total)

IDNameProductFamilySeverity
4284Mac OS X < 10.4.11 Multiple Vulnerabilities (Security Update 2007-008)Nessus Network MonitorOperating System Detection
critical
28212Mac OS X < 10.4.11 Multiple Vulnerabilities (Security Update 2007-008)NessusMacOS X Local Security Checks
critical