ID

VAR-201306-0311


CVE

CVE-2013-3953


TITLE

Apple Mac OS X of XNU kernel Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2013-002900

DESCRIPTION

The mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call. Apple Mac OS X is prone to a local information-disclosure vulnerability. Local attackers can exploit this issue to obtain sensitive information that may lead to further attacks. The vulnerability is caused by the program not initializing certain structure member variables

Trust: 1.98

sources: NVD: CVE-2013-3953 // JVNDB: JVNDB-2013-002900 // BID: 60441 // VULHUB: VHN-63955

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:6.1.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:5.1.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:6.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:6.1.3

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:6.1.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.x

Trust: 0.8

vendor:applemodel:tvscope:ltversion:6.0 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

sources: BID: 60441 // JVNDB: JVNDB-2013-002900 // CNNVD: CNNVD-201306-093 // NVD: CVE-2013-3953

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3953
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-3953
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201306-093
value: MEDIUM

Trust: 0.6

VULHUB: VHN-63955
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-3953
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-63955
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-63955 // JVNDB: JVNDB-2013-002900 // CNNVD: CNNVD-201306-093 // NVD: CVE-2013-3953

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-63955 // JVNDB: JVNDB-2013-002900 // NVD: CVE-2013-3953

THREAT TYPE

local

Trust: 0.9

sources: BID: 60441 // CNNVD: CNNVD-201306-093

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201306-093

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002900

PATCH

title:OS Xurl:http://www.apple.com/jp/osx/

Trust: 0.8

title:APPLE-SA-2013-09-18-2url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934?viewlocale=ja_JP

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2013-002900

EXTERNAL IDS

db:NVDid:CVE-2013-3953

Trust: 2.8

db:SECTRACKid:1029054

Trust: 1.1

db:JVNid:JVNVU98681940

Trust: 0.8

db:JVNDBid:JVNDB-2013-002900

Trust: 0.8

db:CNNVDid:CNNVD-201306-093

Trust: 0.7

db:BIDid:60441

Trust: 0.4

db:VULHUBid:VHN-63955

Trust: 0.1

sources: VULHUB: VHN-63955 // BID: 60441 // JVNDB: JVNDB-2013-002900 // CNNVD: CNNVD-201306-093 // NVD: CVE-2013-3953

REFERENCES

url:http://antid0te.com/syscan_2013/syscan2013_mountain_lion_ios_vulnerabilities_garage_sale_whitepaper.pdf

Trust: 2.5

url:http://www.syscan.org/index.php/sg/program/day/2

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2013/sep/msg00006.html

Trust: 1.1

url:http://support.apple.com/kb/ht5934

Trust: 1.1

url:http://www.securitytracker.com/id/1029054

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3953

Trust: 0.8

url:http://jvn.jp/cert/jvnvu98681940/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3953

Trust: 0.8

url:http://www.apple.com

Trust: 0.3

sources: VULHUB: VHN-63955 // BID: 60441 // JVNDB: JVNDB-2013-002900 // CNNVD: CNNVD-201306-093 // NVD: CVE-2013-3953

CREDITS

Stefan Esser

Trust: 0.3

sources: BID: 60441

SOURCES

db:VULHUBid:VHN-63955
db:BIDid:60441
db:JVNDBid:JVNDB-2013-002900
db:CNNVDid:CNNVD-201306-093
db:NVDid:CVE-2013-3953

LAST UPDATE DATE

2025-04-11T20:21:53.206000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-63955date:2013-10-11T00:00:00
db:BIDid:60441date:2015-03-19T09:31:00
db:JVNDBid:JVNDB-2013-002900date:2013-10-22T00:00:00
db:CNNVDid:CNNVD-201306-093date:2013-06-06T00:00:00
db:NVDid:CVE-2013-3953date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-63955date:2013-06-05T00:00:00
db:BIDid:60441date:2013-04-26T00:00:00
db:JVNDBid:JVNDB-2013-002900date:2013-06-07T00:00:00
db:CNNVDid:CNNVD-201306-093date:2013-06-06T00:00:00
db:NVDid:CVE-2013-3953date:2013-06-05T14:39:55.940