CVE-2013-3949
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
05/06/2013
Last modified:
11/04/2025
Description
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not prevent use of the _POSIX_SPAWN_DISABLE_ASLR and _POSIX_SPAWN_ALLOW_DATA_EXEC flags for setuid and setgid programs, which allows local users to bypass intended access restrictions via a wrapper program that calls the posix_spawnattr_setflags function.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf
- http://www.syscan.org/index.php/sg/program/day/2
- http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf
- http://www.syscan.org/index.php/sg/program/day/2



