Vulnerability Description
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, which allows local users to bypass intended access restrictions via a wrapper program that calls the posix_spawnattr_setflags function.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | 10.8.0 |
Related Weaknesses (CWE)
References
- http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_GarExploit
- http://www.syscan.org/index.php/sg/program/day/2
- http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_GarExploit
- http://www.syscan.org/index.php/sg/program/day/2
FAQ
What is CVE-2013-3949?
CVE-2013-3949 is a vulnerability with a CVSS score of 2.1 (LOW). The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, whic...
How severe is CVE-2013-3949?
CVE-2013-3949 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3949?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X.