The kernel in Apple Mac OS X 10.4 through 10.4.10 does not reset the current Mach Thread Port or Thread Exception Port when executing a setuid program, which allows local users to execute arbitrary code by creating the port before launching the setuid program, then writing to the address space of the setuid process.
References
| Link | Resource |
|---|---|
| http://docs.info.apple.com/article.html?artnum=307041 | Broken Link |
| http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 | Broken Link |
| http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html | Mailing List |
| http://secunia.com/advisories/27643 | Broken Link Vendor Advisory |
| http://www.securityfocus.com/bid/26444 | Broken Link Third Party Advisory VDB Entry |
| http://www.us-cert.gov/cas/techalerts/TA07-319A.html | Broken Link Third Party Advisory US Government Resource |
| http://www.vupen.com/english/advisories/2007/3868 | Broken Link Vendor Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2007-11-15 01:46
Updated : 2024-02-09 00:35
NVD link : CVE-2007-3749
Mitre link : CVE-2007-3749
CVE.ORG link : CVE-2007-3749
JSON object : View
Products Affected
apple
- mac_os_x
CWE
CWE-665
Improper Initialization
