Show filters
59 Total Results
Displaying 51-59 of 59
Sort by:
Attacker Value
Unknown

CVE-2013-5187

Disclosure Date: October 24, 2013 (last updated October 05, 2023)
The Screen Lock implementation in Apple Mac OS X before 10.9 does not immediately accept Keychain Status menu Lock Screen commands, and instead incorrectly relies on a certain timeout setting, which allows physically proximate attackers to obtain sensitive information by reading a screen that should have transitioned into the locked state.
0
Attacker Value
Unknown

CVE-2013-5184

Disclosure Date: October 24, 2013 (last updated October 05, 2023)
The kernel in Apple Mac OS X before 10.9 does not properly check for errors during the processing of multicast Wi-Fi packets, which allows remote attackers to cause a denial of service (system crash) by leveraging presence in an 802.11 network's coverage area.
0
Attacker Value
Unknown

CVE-2013-5166

Disclosure Date: October 24, 2013 (last updated October 05, 2023)
The Bluetooth USB host controller in Apple Mac OS X before 10.9 prematurely deletes interfaces, which allows local users to cause a denial of service (system crash) via a crafted application.
0
Attacker Value
Unknown

CVE-2013-5163

Disclosure Date: October 04, 2013 (last updated October 05, 2023)
Directory Services in Apple Mac OS X before 10.8.5 Supplemental Update allows local users to bypass password-based authentication and modify arbitrary Directory Services records via unspecified vectors.
0
Attacker Value
Unknown

CVE-2013-3953

Disclosure Date: June 05, 2013 (last updated October 05, 2023)
The mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call.
0
Attacker Value
Unknown

CVE-2013-3951

Disclosure Date: June 05, 2013 (last updated October 05, 2023)
sys/openbsd/stack_protector.c in libc in Apple iOS 6.1.3 and Mac OS X 10.8.x does not properly parse the Apple strings employed in the user-space stack-cookie implementation, which allows local users to bypass cookie randomization by executing a program with a call-path beginning with the stack-guard= substring, as demonstrated by an iOS untethering attack or an attack against a setuid Mac OS X program.
0
Attacker Value
Unknown

CVE-2013-3949

Disclosure Date: June 05, 2013 (last updated October 05, 2023)
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, which allows local users to bypass intended access restrictions via a wrapper program that calls the posix_spawnattr_setflags function.
0
Attacker Value
Unknown

CVE-2013-3954

Disclosure Date: June 05, 2013 (last updated October 05, 2023)
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not properly validate the data for file actions and port actions, which allows local users to (1) cause a denial of service (panic) via a size value that is inconsistent with a header count field, or (2) obtain sensitive information from kernel heap memory via a certain size value in conjunction with a crafted buffer.
0
Attacker Value
Unknown

CVE-2013-3952

Disclosure Date: June 05, 2013 (last updated October 05, 2023)
The fill_pipeinfo function in bsd/kern/sys_pipe.c in the XNU kernel in Apple Mac OS X 10.8.x allows local users to defeat the KASLR protection mechanism via the PROC_PIDFDPIPEINFO option to the proc_info system call for a kernel pipe handle.
0