7.8
CVSSv3

CVE-2016-7633

Published: 20/02/2017 Updated: 03/09/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in certain Apple products. macOS prior to 10.12.2 is affected. The issue involves the "Directory Services" component. It allows local users to gain privileges or cause a denial of service (use-after-free) via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x

Exploits

/* Source: bugschromiumorg/p/project-zero/issues/detail?id=954 Proofs of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40954zip Userspace MIG services often use mach_msg_server or mach_msg_server_once to implent an RPC server These two functions are also responsible for managing the resou ...

Recent Articles

Google's Project Zero reveals Apple jailbreak exploit
The Register • Richard Chirgwin • 12 Dec 2017

Holy Moley! iOS and MacOS were wholly holey

Ian Beer of Google's Project Zero has followed up on a “coming soon” Twitter teaser with a jailbreakable iOS and Mac OS vulnerability. Beer went public after Apple worked out a fix for the kernel memory corruption bug. He even launched a Twitter account for the occasion: (For non-programmers: tfp0 stands for “task for pid 0” – the kernel task port, and therefore the vector for pwnage.) The release is designed to let others take their own toolkits to Apple devices, ultimately to improve...