First published: Wed Jun 05 2013(Updated: )
The mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 | |
iStyle @cosme iPhone OS | <=6.1.4 | |
iStyle @cosme iPhone OS | =1.0.0 | |
iStyle @cosme iPhone OS | =1.0.1 | |
iStyle @cosme iPhone OS | =1.0.2 | |
iStyle @cosme iPhone OS | =1.1.0 | |
iStyle @cosme iPhone OS | =1.1.1 | |
iStyle @cosme iPhone OS | =1.1.2 | |
iStyle @cosme iPhone OS | =1.1.3 | |
iStyle @cosme iPhone OS | =1.1.4 | |
iStyle @cosme iPhone OS | =1.1.5 | |
iStyle @cosme iPhone OS | =2.0 | |
iStyle @cosme iPhone OS | =2.0.0 | |
iStyle @cosme iPhone OS | =2.0.1 | |
iStyle @cosme iPhone OS | =2.0.2 | |
iStyle @cosme iPhone OS | =2.1 | |
iStyle @cosme iPhone OS | =2.1.1 | |
iStyle @cosme iPhone OS | =2.2 | |
iStyle @cosme iPhone OS | =2.2.1 | |
iStyle @cosme iPhone OS | =3.0 | |
iStyle @cosme iPhone OS | =3.0.1 | |
iStyle @cosme iPhone OS | =3.1 | |
iStyle @cosme iPhone OS | =3.1.2 | |
iStyle @cosme iPhone OS | =3.1.3 | |
iStyle @cosme iPhone OS | =3.2 | |
iStyle @cosme iPhone OS | =3.2.1 | |
iStyle @cosme iPhone OS | =3.2.2 | |
iStyle @cosme iPhone OS | =4.0 | |
iStyle @cosme iPhone OS | =4.0.1 | |
iStyle @cosme iPhone OS | =4.0.2 | |
iStyle @cosme iPhone OS | =4.1 | |
iStyle @cosme iPhone OS | =4.2.1 | |
iStyle @cosme iPhone OS | =4.2.5 | |
iStyle @cosme iPhone OS | =4.2.8 | |
iStyle @cosme iPhone OS | =4.3.0 | |
iStyle @cosme iPhone OS | =4.3.1 | |
iStyle @cosme iPhone OS | =4.3.2 | |
iStyle @cosme iPhone OS | =4.3.3 | |
iStyle @cosme iPhone OS | =4.3.5 | |
iStyle @cosme iPhone OS | =5.0 | |
iStyle @cosme iPhone OS | =5.0.1 | |
iStyle @cosme iPhone OS | =5.1 | |
iStyle @cosme iPhone OS | =5.1.1 | |
iStyle @cosme iPhone OS | =6.0 | |
iStyle @cosme iPhone OS | =6.0.1 | |
iStyle @cosme iPhone OS | =6.0.2 | |
iStyle @cosme iPhone OS | =6.1 | |
iStyle @cosme iPhone OS | =6.1.2 | |
iStyle @cosme iPhone OS | =6.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3953 is classified as a medium-severity vulnerability due to its potential to expose sensitive information from kernel heap memory.
To remediate CVE-2013-3953, users should upgrade their macOS to the latest version that addresses this vulnerability.
CVE-2013-3953 affects local users on Apple Mac OS X versions 10.8.0 through 10.8.4, as well as certain versions of Apple iPhone OS.
The implications of CVE-2013-3953 include the risk of unauthorized access to sensitive information from the kernel, which could compromise user privacy.
There are no known workarounds for CVE-2013-3953; the only effective solution is to apply the necessary updates.