Vulnerability Details : CVE-2013-3951
Potential exploit
sys/openbsd/stack_protector.c in libc in Apple iOS 6.1.3 and Mac OS X 10.8.x does not properly parse the Apple strings employed in the user-space stack-cookie implementation, which allows local users to bypass cookie randomization by executing a program with a call-path beginning with the stack-guard= substring, as demonstrated by an iOS untethering attack or an attack against a setuid Mac OS X program.
Products affected by CVE-2013-3951
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-3951
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-3951
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2013-3951
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3951
-
http://www.syscan.org/index.php/sg/program/day/2
-
https://support.apple.com/HT205267
About the security content of OS X El Capitan v10.11 - Apple SupportVendor Advisory
-
http://www.securitytracker.com/id/1033703
Apple OS X Multiple Flaws Let Remote and Local Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Deny Service and Let Local Users Gain Elevated Privileges - SecurityTracker
-
http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf
404 - Not FoundExploit
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
Apple - Lists.apple.comVendor Advisory
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
Apple - Lists.apple.comVendor Advisory
-
https://support.apple.com/HT205212
About the security content of iOS 9 - Apple SupportVendor Advisory
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Apple - Lists.apple.comVendor Advisory
-
https://support.apple.com/HT205213
About the security content of watchOS 2 - Apple SupportVendor Advisory
Jump to