Vulnerability Description
The mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | 10.8.0 |
| Apple | Iphone Os | <= 6.1.4 |
Related Weaknesses (CWE)
References
- http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_GarExploit
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://support.apple.com/kb/HT5934
- http://www.securitytracker.com/id/1029054
- http://www.syscan.org/index.php/sg/program/day/2
- http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_GarExploit
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://support.apple.com/kb/HT5934
- http://www.securitytracker.com/id/1029054
- http://www.syscan.org/index.php/sg/program/day/2
FAQ
What is CVE-2013-3953?
CVE-2013-3953 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive info...
How severe is CVE-2013-3953?
CVE-2013-3953 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3953?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X, Apple Iphone Os.