Vulnerability Details : CVE-2009-1235
XNU 1228.9.59 and earlier on Apple Mac OS X 10.5.6 and earlier does not properly restrict interaction between user space and the HFS IOCTL handler, which allows local users to overwrite kernel memory and gain privileges by attaching an HFS+ disk image and performing certain steps involving HFS_GET_BOOT_INFO fcntl calls.
Products affected by CVE-2009-1235
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.8:*:mac_mini:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.8:*:macbook:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.8:*:macbook_pro:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.2:2008-002:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*
Threat overview for CVE-2009-1235
Top countries where our scanners detected CVE-2009-1235
Top open port discovered on systems with this issue
548
IPs affected by CVE-2009-1235 37
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2009-1235!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-1235
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-1235
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2009-1235
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1235
-
http://support.apple.com/kb/HT3757
About the security content of Security Update 2009-003 / Mac OS X v10.5.8 - Apple Support
-
http://www.securitytracker.com/id?1022671
-
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
-
http://www.vupen.com/english/advisories/2009/2172
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.digit-labs.org/files/exploits/xnu-hfs-fcntl-v2.sh
Exploit
-
http://www.digit-labs.org/files/exploits/xnu-hfs-fcntl-v2.c
Exploit
-
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
Apple Updates for Multiple Vulnerabilities | CISAUS Government Resource
-
http://www.securityfocus.com/bid/34203
Exploit
-
https://www.exploit-db.com/exploits/8266
-
http://www.vupen.com/english/advisories/2009/0822
Vendor Advisory
-
http://www.informationweek.com/news/hardware/mac/showArticle.jhtml?articleID=216401181
Jump to