|Category:||Mac OS X Local Security Checks|
|Title:||Apple Mac OS X Predefined Sandbox Profiles Security Bypass Vulnerability|
|Summary:||The host is installed with Apple Mac OS X operating system and; is prone to a sandbox profiles security bypass vulnerability.|
The host is installed with Apple Mac OS X operating system and
is prone to a sandbox profiles security bypass vulnerability.
The kSBXProfileNoNetwork and kSBXProfileNoInternet sandbox
profiles fails to propagate restrictions to all created processes, which allows remote attackers
to access network resources via apple events to invoke the execution of other applications not
directly restricted by the sandbox.
Successful exploitation will let attackers to gain unauthorized
access to restricted network resources through the use of Apple events.
Apple Mac OS X version 10.5.x through 10.7.2.
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
BugTraq ID: 50644|
BugTraq ID: 50716
Common Vulnerability Exposure (CVE) ID: CVE-2011-1516
Bugtraq: 20111110 CORE-2011-0919: Apple OS X Sandbox Predefined Profiles Bypass (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2008-7303
|Copyright||Copyright (c) 2013 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.