First published: Fri Jul 03 2015(Updated: )
Race condition in kext tools in Apple OS X before 10.10.4 allows local users to bypass intended signature requirements for kernel extensions by leveraging improper pathname validation.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3709 is classified as a high severity vulnerability due to its potential to allow local users to bypass signature requirements for kernel extensions.
To fix CVE-2015-3709, users should update their Apple OS X to version 10.10.4 or later.
CVE-2015-3709 affects local users on Apple OS X versions prior to 10.10.4.
CVE-2015-3709 is a race condition vulnerability in kext tools that allows for improper pathname validation.
Yes, exploiting CVE-2015-3709 could lead to unauthorized kernel extension management, potentially allowing for further attacks on the system.