First published: Wed Jun 05 2013(Updated: )
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, which allows local users to bypass intended access restrictions via a wrapper program that calls the posix_spawnattr_setflags function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.8.0 | |
macOS Yosemite | =10.8.1 | |
macOS Yosemite | =10.8.2 | |
macOS Yosemite | =10.8.3 | |
macOS Yosemite | =10.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3949 is classified as a medium severity vulnerability.
To fix CVE-2013-3949, it's recommended to upgrade to a non-affected version of macOS, preferably a version later than 10.8.4.
CVE-2013-3949 affects users running Mac OS X versions 10.8.0 to 10.8.4.
CVE-2013-3949 can be exploited by local users through a wrapper program to bypass access restrictions.
CVE-2013-3949 impacts the posix_spawn system call within the XNU kernel of macOS.