sys/openbsd/stack_protector.c in libc in Apple iOS 6.1.3 and Mac OS X 10.8.x does not properly parse the Apple strings employed in the user-space stack-cookie implementation, which allows local users to bypass cookie randomization by executing a program with a call-path beginning with the stack-guard= substring, as demonstrated by an iOS untethering attack or an attack against a setuid Mac OS X program.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple iphone os |
||
apple mac os x |
||
apple watchos |
||
apple mac os x 10.8.1 |
||
apple mac os x 10.8.3 |
||
apple mac os x 10.8.4 |
||
apple mac os x 10.8.0 |
||
apple mac os x 10.8.2 |
||
apple iphone os 6.1.3 |