ID

VAR-201507-0409


CVE

CVE-2015-3715


TITLE

Apple OS X of code-signing Vulnerability that bypasses startup restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2015-003406

DESCRIPTION

The code-signing implementation in Apple OS X before 10.10.4 does not properly consider libraries that are external to an application bundle, which allows attackers to bypass intended launch restrictions via a crafted library. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlAn attacker could bypass the launch restrictions through a crafted library. Apple Mac OS X is prone to multiple security vulnerabilities. The update addresses new vulnerabilities that affect Admin Framework, afpserver, apache, AppleGraphicsControl, AppleFSCompression, AppleThunderboltEDMService, ATS, Bluetooth, Display Drivers, Intel Graphics Driver, IOAcceleratorFamily, IOFireWireFamily, Kernel, Install Framework Legacy, kext tools, ntfs, QuickTime, Security, Spotlight, and System Stats components. Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks. These issues affect OS X prior to 10.10.4. The vulnerability stems from the fact that the program does not verify libraries external to the application package

Trust: 2.07

sources: NVD: CVE-2015-3715 // JVNDB: JVNDB-2015-003406 // BID: 75493 // VULHUB: VHN-81676 // VULMON: CVE-2015-3715

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.10.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.3

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10.3

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.3.4

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7

Trust: 0.3

sources: BID: 75493 // JVNDB: JVNDB-2015-003406 // CNNVD: CNNVD-201507-076 // NVD: CVE-2015-3715

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3715
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-3715
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201507-076
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81676
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-3715
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3715
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-81676
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-81676 // VULMON: CVE-2015-3715 // JVNDB: JVNDB-2015-003406 // CNNVD: CNNVD-201507-076 // NVD: CVE-2015-3715

PROBLEMTYPE DATA

problemtype:CWE-254

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-81676 // JVNDB: JVNDB-2015-003406 // NVD: CVE-2015-3715

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201507-076

TYPE

Unknown

Trust: 0.3

sources: BID: 75493

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003406

PATCH

title:APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update 2015-005url:http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html

Trust: 0.8

title:HT204942url:http://support.apple.com/en-us/HT204942

Trust: 0.8

title:HT204942url:http://support.apple.com/ja-jp/HT204942

Trust: 0.8

title:Apple: OS X Yosemite v10.10.4 and Security Update 2015-005url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=50398602701d671602946005c7864211

Trust: 0.1

sources: VULMON: CVE-2015-3715 // JVNDB: JVNDB-2015-003406

EXTERNAL IDS

db:NVDid:CVE-2015-3715

Trust: 2.9

db:BIDid:75493

Trust: 1.5

db:SECTRACKid:1032760

Trust: 1.2

db:JVNDBid:JVNDB-2015-003406

Trust: 0.8

db:CNNVDid:CNNVD-201507-076

Trust: 0.7

db:VULHUBid:VHN-81676

Trust: 0.1

db:VULMONid:CVE-2015-3715

Trust: 0.1

sources: VULHUB: VHN-81676 // VULMON: CVE-2015-3715 // BID: 75493 // JVNDB: JVNDB-2015-003406 // CNNVD: CNNVD-201507-076 // NVD: CVE-2015-3715

REFERENCES

url:http://support.apple.com/kb/ht204942

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html

Trust: 1.8

url:http://www.securityfocus.com/bid/75493

Trust: 1.2

url:http://www.securitytracker.com/id/1032760

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3715

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3715

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/254.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/apple-osx-adminframework-cve-2015-3718

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39581

Trust: 0.1

sources: VULHUB: VHN-81676 // VULMON: CVE-2015-3715 // BID: 75493 // JVNDB: JVNDB-2015-003406 // CNNVD: CNNVD-201507-076 // NVD: CVE-2015-3715

CREDITS

Emil Kvarnhammar at TrueSec, Patrick Wardle of Synack, Dean Jerkovich of NCC Group, Apple, Chen Liang of KEEN Team, an anonymous researcher working with HP's Zero Day Initiative, Pawel Wylecial working with HP's Zero Day Initiative, John Villamil (@day6rea

Trust: 0.3

sources: BID: 75493

SOURCES

db:VULHUBid:VHN-81676
db:VULMONid:CVE-2015-3715
db:BIDid:75493
db:JVNDBid:JVNDB-2015-003406
db:CNNVDid:CNNVD-201507-076
db:NVDid:CVE-2015-3715

LAST UPDATE DATE

2025-04-13T20:33:41.847000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81676date:2017-09-22T00:00:00
db:VULMONid:CVE-2015-3715date:2017-09-22T00:00:00
db:BIDid:75493date:2015-07-15T00:57:00
db:JVNDBid:JVNDB-2015-003406date:2015-07-08T00:00:00
db:CNNVDid:CNNVD-201507-076date:2015-07-03T00:00:00
db:NVDid:CVE-2015-3715date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-81676date:2015-07-03T00:00:00
db:VULMONid:CVE-2015-3715date:2015-07-03T00:00:00
db:BIDid:75493date:2015-06-30T00:00:00
db:JVNDBid:JVNDB-2015-003406date:2015-07-08T00:00:00
db:CNNVDid:CNNVD-201507-076date:2015-07-03T00:00:00
db:NVDid:CVE-2015-3715date:2015-07-03T02:00:07.307