725
VMScore

CVE-2016-7660

Published: 20/02/2017 Updated: 30/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in certain Apple products. iOS prior to 10.2 is affected. macOS prior to 10.12.2 is affected. watchOS prior to 3.1.3 is affected. The issue involves the "syslog" component. It allows local users to gain privileges via unspecified vectors related to Mach port name references.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple iphone os

apple mac os x

apple watchos

Exploits

/* Source: bugschromiumorg/p/project-zero/issues/detail?id=977 syslogd (running as root) hosts the comapplesystemlogger mach service It's part of the systemsb sandbox profile and so reachable from a lot of sandboxed contexts Here's a snippet from its mach message handling loop listening on the service port: ks = mach_msg(&amp ...