First published: Wed Jun 05 2013(Updated: )
sys/openbsd/stack_protector.c in libc in Apple iOS 6.1.3 and Mac OS X 10.8.x does not properly parse the Apple strings employed in the user-space stack-cookie implementation, which allows local users to bypass cookie randomization by executing a program with a call-path beginning with the stack-guard= substring, as demonstrated by an iOS untethering attack or an attack against a setuid Mac OS X program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=8.2 | |
Apple iOS and macOS | <=10.10.4 | |
Apple iOS, iPadOS, and watchOS | <=1.0.1 | |
iStyle @cosme iPhone OS | =6.1.3 | |
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3951 is rated as a high-severity vulnerability due to its potential to allow local users to bypass stack protection mechanisms.
To fix CVE-2013-3951, it is recommended to update to the latest version of Apple iOS, macOS, or watchOS that addresses this vulnerability.
CVE-2013-3951 affects Apple iOS versions up to 8.2, macOS versions up to 10.10.4, and watchOS versions up to 1.0.1.
Local users on affected Apple devices are at risk from CVE-2013-3951 as it allows exploitation of the security feature related to stack cookies.
CVE-2013-3951 falls under local privilege escalation vulnerabilities due to improper implementation of stack cookie protections.