ID

VAR-201508-0413


CVE

CVE-2015-3769


TITLE

Apple OS X of IOFireWireFamily Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2015-004266

DESCRIPTION

IOFireWireFamily in Apple OS X before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3771 and CVE-2015-3772. Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks. Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability). These issues affect OS X prior to 10.10.5

Trust: 1.98

sources: NVD: CVE-2015-3769 // JVNDB: JVNDB-2015-004266 // BID: 76340 // VULHUB: VHN-81730

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.10.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10.4

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.3.4

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

sources: BID: 76340 // JVNDB: JVNDB-2015-004266 // CNNVD: CNNVD-201508-269 // NVD: CVE-2015-3769

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3769
value: HIGH

Trust: 1.0

NVD: CVE-2015-3769
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201508-269
value: HIGH

Trust: 0.6

VULHUB: VHN-81730
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-3769
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-81730
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-81730 // JVNDB: JVNDB-2015-004266 // CNNVD: CNNVD-201508-269 // NVD: CVE-2015-3769

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-81730 // JVNDB: JVNDB-2015-004266 // NVD: CVE-2015-3769

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201508-269

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201508-269

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004266

PATCH

title:Apple security updatesurl:http://support.apple.com/en-us/HT1222

Trust: 0.8

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205031url:http://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205031url:http://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:osxupd10.10.5url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=57197

Trust: 0.6

title:iPhone7,1_8.4.1_12H321_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=57198

Trust: 0.6

sources: JVNDB: JVNDB-2015-004266 // CNNVD: CNNVD-201508-269

EXTERNAL IDS

db:NVDid:CVE-2015-3769

Trust: 2.8

db:BIDid:76340

Trust: 2.0

db:SECTRACKid:1033276

Trust: 1.1

db:JVNid:JVNVU94440136

Trust: 0.8

db:JVNDBid:JVNDB-2015-004266

Trust: 0.8

db:CNNVDid:CNNVD-201508-269

Trust: 0.7

db:ZDIid:ZDI-15-390

Trust: 0.3

db:VULHUBid:VHN-81730

Trust: 0.1

sources: VULHUB: VHN-81730 // BID: 76340 // JVNDB: JVNDB-2015-004266 // CNNVD: CNNVD-201508-269 // NVD: CVE-2015-3769

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/76340

Trust: 1.7

url:https://support.apple.com/kb/ht205031

Trust: 1.7

url:http://www.securitytracker.com/id/1033276

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3769

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94440136/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3769

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-390/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00004.html

Trust: 0.3

url:https://support.apple.com/en-ie/ht205031

Trust: 0.3

sources: VULHUB: VHN-81730 // BID: 76340 // JVNDB: JVNDB-2015-004266 // CNNVD: CNNVD-201508-269 // NVD: CVE-2015-3769

CREDITS

An anonymous researcher working with HP's Zero Day Initiative, Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team, Maxime VILLARD of m00nbsd, Ryan Pentney and Richard Johnson of Cisco Talos, Xiaoyong Wu of the Evernote Security Team, JieTao Yang of KeenTeam

Trust: 0.6

sources: CNNVD: CNNVD-201508-269

SOURCES

db:VULHUBid:VHN-81730
db:BIDid:76340
db:JVNDBid:JVNDB-2015-004266
db:CNNVDid:CNNVD-201508-269
db:NVDid:CVE-2015-3769

LAST UPDATE DATE

2025-04-13T20:41:02.744000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81730date:2017-09-21T00:00:00
db:BIDid:76340date:2016-07-05T21:35:00
db:JVNDBid:JVNDB-2015-004266date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-269date:2015-08-18T00:00:00
db:NVDid:CVE-2015-3769date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-81730date:2015-08-16T00:00:00
db:BIDid:76340date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004266date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-269date:2015-08-18T00:00:00
db:NVDid:CVE-2015-3769date:2015-08-16T23:59:42.487