Vulnerability Description
Race condition in kext tools in Apple OS X before 10.10.4 allows local users to bypass intended signature requirements for kernel extensions by leveraging improper pathname validation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | <= 10.10.3 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlPatchVendor Advisory
- http://support.apple.com/kb/HT204942Vendor Advisory
- http://www.securityfocus.com/bid/75493
- http://www.securitytracker.com/id/1032760
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlPatchVendor Advisory
- http://support.apple.com/kb/HT204942Vendor Advisory
- http://www.securityfocus.com/bid/75493
- http://www.securitytracker.com/id/1032760
FAQ
What is CVE-2015-3709?
CVE-2015-3709 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Race condition in kext tools in Apple OS X before 10.10.4 allows local users to bypass intended signature requirements for kernel extensions by leveraging improper pathname validation.
How severe is CVE-2015-3709?
CVE-2015-3709 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3709?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X.