First published: Tue Nov 15 2011(Updated: )
The nonet and nointernet sandbox profiles in Apple Mac OS X 10.5.x do not propagate restrictions to all created processes, which allows remote attackers to access network resources via a crafted application, as demonstrated by use of launchctl to trigger the launchd daemon's execution of a script file, a related issue to CVE-2011-1516.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.5.8 | |
Apple iOS and macOS | =10.5.6 | |
Apple iOS and macOS | =10.5.5 | |
Apple iOS and macOS | =10.5.1 | |
Apple iOS and macOS | =10.5.3 | |
Apple iOS and macOS | =10.5.0 | |
Apple iOS and macOS | =10.5.2 | |
Apple iOS and macOS | =10.5.7 | |
Apple iOS and macOS | =10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7303 has a medium severity rating as it allows a remote attacker to bypass sandbox restrictions.
To fix CVE-2008-7303, update your Apple Mac OS X to the latest version that includes patching of this vulnerability.
CVE-2008-7303 affects all 10.5.x versions of Apple Mac OS X, including 10.5.0 through 10.5.8.
The impact of CVE-2008-7303 is that it allows unauthorized network access, potentially leading to data leakage or unauthorized actions.
Yes, CVE-2008-7303 can be exploited remotely through a crafted application that bypasses sandbox restrictions.