Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.803223
Categoría:Mac OS X Local Security Checks
Título:Apple Mac OS X Predefined Sandbox Profiles Security Bypass Vulnerability
Resumen:Apple Mac OS X operating system is prone to a sandbox profiles security bypass vulnerability.
Descripción:Summary:
Apple Mac OS X operating system is prone to a sandbox profiles security bypass vulnerability.

Vulnerability Insight:
The kSBXProfileNoNetwork and kSBXProfileNoInternet sandbox
profiles fails to propagate restrictions to all created processes, which allows remote attackers
to access network resources via apple events to invoke the execution of other applications not
directly restricted by the sandbox.

Vulnerability Impact:
Successful exploitation will let attackers to gain unauthorized
access to restricted network resources through the use of Apple events.

Affected Software/OS:
Apple Mac OS X version 10.5.x through 10.7.2.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1516
Bugtraq: 20111110 CORE-2011-0919: Apple OS X Sandbox Predefined Profiles Bypass (Google Search)
http://www.securityfocus.com/archive/1/520479/100/100/threaded
http://www.coresecurity.com/content/apple-osx-sandbox-bypass
Common Vulnerability Exposure (CVE) ID: CVE-2008-7303
https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Miller/BlackHat-Japan-08-Miller-Hacking-OSX.pdf
CopyrightCopyright (C) 2013 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.