First published: Thu Oct 24 2013(Updated: )
App Sandbox in Apple Mac OS X before 10.9 allows attackers to bypass intended sandbox restrictions via a crafted app that uses the LaunchServices interface to specify process arguments.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.8.5 | |
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 | |
Apple iOS and macOS | =10.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5179 has a severity rating indicating potential for significant security risks due to its ability to bypass sandbox restrictions.
To fix CVE-2013-5179, update your Mac OS X software to version 10.9 or later where the vulnerability has been addressed.
CVE-2013-5179 affects Apple Mac OS X versions prior to 10.9, specifically those up to 10.8.5.
CVE-2013-5179 facilitates attacks that bypass intended sandbox restrictions through crafted applications using the LaunchServices interface.
There are no specific workarounds for CVE-2013-5179 besides updating to a patched version of Mac OS X.