First published: Mon Dec 31 2018(Updated: )
An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. This issue affects osquery prior to v3.2.7
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Osquery | <3.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6336 has a medium severity rating due to the potential for malicious code execution.
To fix CVE-2018-6336, update osquery to version 3.2.8 or later where the vulnerability is addressed.
All versions of osquery prior to 3.2.8 are affected by CVE-2018-6336.
CVE-2018-6336 allows attackers to potentially execute malicious code disguised as a signed application, undermining third-party code signing checks.
Users of osquery versions before 3.2.8, especially those relying on third-party code verification, are impacted by CVE-2018-6336.