CVE-2013-3951

medium

Description

sys/openbsd/stack_protector.c in libc in Apple iOS 6.1.3 and Mac OS X 10.8.x does not properly parse the Apple strings employed in the user-space stack-cookie implementation, which allows local users to bypass cookie randomization by executing a program with a call-path beginning with the stack-guard= substring, as demonstrated by an iOS untethering attack or an attack against a setuid Mac OS X program.

References

https://support.apple.com/HT205267

https://support.apple.com/HT205213

https://support.apple.com/HT205212

http://www.syscan.org/index.php/sg/program/day/2

http://www.securitytracker.com/id/1033703

http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html

http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html

http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html

Details

Source: Mitre, NVD

Published: 2013-06-05

Updated: 2016-12-08

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Severity: Medium