ID

VAR-201508-0404


CVE

CVE-2015-3760


TITLE

Apple OS X of dyld Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2015-004260

DESCRIPTION

dyld in Apple OS X before 10.10.5 does not properly validate pathnames in the environment, which allows local users to gain privileges via unspecified vectors. Apple Mac OS X is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks. Note: The issue described by CVE-2015-3778 has been removed. These issues affect OS X prior to 10.10.5. A local attacker could exploit this vulnerability to gain privileges

Trust: 2.07

sources: NVD: CVE-2015-3760 // JVNDB: JVNDB-2015-004260 // BID: 76340 // VULHUB: VHN-81721 // VULMON: CVE-2015-3760

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.10.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10.4

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.3.4

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

sources: BID: 76340 // JVNDB: JVNDB-2015-004260 // CNNVD: CNNVD-201508-266 // NVD: CVE-2015-3760

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3760
value: HIGH

Trust: 1.0

NVD: CVE-2015-3760
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201508-266
value: HIGH

Trust: 0.6

VULHUB: VHN-81721
value: HIGH

Trust: 0.1

VULMON: CVE-2015-3760
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-3760
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-81721
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-81721 // VULMON: CVE-2015-3760 // JVNDB: JVNDB-2015-004260 // CNNVD: CNNVD-201508-266 // NVD: CVE-2015-3760

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-81721 // JVNDB: JVNDB-2015-004260 // NVD: CVE-2015-3760

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201508-266

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201508-266

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004260

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205031url:http://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205031url:http://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:macos-kernel-exploitsurl:https://github.com/ozkanbilge/MacOSX-Kernel-Exploits

Trust: 0.1

title:macos-kernel-exploitsurl:https://github.com/SecWiki/macos-kernel-exploits

Trust: 0.1

title:rootOSurl:https://github.com/TH3-HUNT3R/Root-MacOS

Trust: 0.1

title:rootOSurl:https://github.com/ruxzy1/rootOS

Trust: 0.1

title:rootOSurl:https://github.com/thehappydinoa/rootOS

Trust: 0.1

sources: VULMON: CVE-2015-3760 // JVNDB: JVNDB-2015-004260

EXTERNAL IDS

db:NVDid:CVE-2015-3760

Trust: 2.9

db:BIDid:76340

Trust: 2.1

db:SECTRACKid:1033276

Trust: 1.2

db:JVNid:JVNVU94440136

Trust: 0.8

db:JVNDBid:JVNDB-2015-004260

Trust: 0.8

db:CNNVDid:CNNVD-201508-266

Trust: 0.7

db:ZDIid:ZDI-15-390

Trust: 0.3

db:VULHUBid:VHN-81721

Trust: 0.1

db:VULMONid:CVE-2015-3760

Trust: 0.1

sources: VULHUB: VHN-81721 // VULMON: CVE-2015-3760 // BID: 76340 // JVNDB: JVNDB-2015-004260 // CNNVD: CNNVD-201508-266 // NVD: CVE-2015-3760

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.8

url:http://www.securityfocus.com/bid/76340

Trust: 1.8

url:https://support.apple.com/kb/ht205031

Trust: 1.8

url:http://www.securitytracker.com/id/1033276

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3760

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94440136/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3760

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-390/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00004.html

Trust: 0.3

url:https://support.apple.com/en-ie/ht205031

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/ozkanbilge/macosx-kernel-exploits

Trust: 0.1

url:https://github.com/secwiki/macos-kernel-exploits

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40485

Trust: 0.1

sources: VULHUB: VHN-81721 // VULMON: CVE-2015-3760 // BID: 76340 // JVNDB: JVNDB-2015-004260 // CNNVD: CNNVD-201508-266 // NVD: CVE-2015-3760

CREDITS

An anonymous researcher working with HP's Zero Day Initiative, Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team, Maxime VILLARD of m00nbsd, Ryan Pentney and Richard Johnson of Cisco Talos, Xiaoyong Wu of the Evernote Security Team, JieTao Yang of KeenTeam

Trust: 0.6

sources: CNNVD: CNNVD-201508-266

SOURCES

db:VULHUBid:VHN-81721
db:VULMONid:CVE-2015-3760
db:BIDid:76340
db:JVNDBid:JVNDB-2015-004260
db:CNNVDid:CNNVD-201508-266
db:NVDid:CVE-2015-3760

LAST UPDATE DATE

2025-04-13T20:48:35.621000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81721date:2017-09-21T00:00:00
db:VULMONid:CVE-2015-3760date:2017-09-21T00:00:00
db:BIDid:76340date:2016-07-05T21:35:00
db:JVNDBid:JVNDB-2015-004260date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-266date:2015-08-18T00:00:00
db:NVDid:CVE-2015-3760date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-81721date:2015-08-16T00:00:00
db:VULMONid:CVE-2015-3760date:2015-08-16T00:00:00
db:BIDid:76340date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004260date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-266date:2015-08-18T00:00:00
db:NVDid:CVE-2015-3760date:2015-08-16T23:59:33.377