ID

VAR-201508-0053


CVE

CVE-2015-5784


TITLE

Apple OS X of Install Framework Legacy Component vulnerable to arbitrary code execution in privileged context

Trust: 0.8

sources: JVNDB: JVNDB-2015-004299

DESCRIPTION

runner in Install.framework in the Install Framework Legacy component in Apple OS X before 10.10.5 does not properly drop privileges, which allows attackers to execute arbitrary code in a privileged context via a crafted app. Apple Mac OS X is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks. Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability). These issues affect OS X prior to 10.10.5. Install Framework Legacy is one of the installation framework components

Trust: 1.98

sources: NVD: CVE-2015-5784 // JVNDB: JVNDB-2015-004299 // BID: 76340 // VULHUB: VHN-83745

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.10.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10.4

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.3.4

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

sources: BID: 76340 // JVNDB: JVNDB-2015-004299 // CNNVD: CNNVD-201508-267 // NVD: CVE-2015-5784

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5784
value: HIGH

Trust: 1.0

NVD: CVE-2015-5784
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201508-267
value: CRITICAL

Trust: 0.6

VULHUB: VHN-83745
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5784
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-83745
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-83745 // JVNDB: JVNDB-2015-004299 // CNNVD: CNNVD-201508-267 // NVD: CVE-2015-5784

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-83745 // JVNDB: JVNDB-2015-004299 // NVD: CVE-2015-5784

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201508-267

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201508-267

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004299

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-83745

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205031url:http://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205031url:http://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:osxupd10.10.5url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=57197

Trust: 0.6

title:iPhone7,1_8.4.1_12H321_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=57198

Trust: 0.6

sources: JVNDB: JVNDB-2015-004299 // CNNVD: CNNVD-201508-267

EXTERNAL IDS

db:NVDid:CVE-2015-5784

Trust: 2.8

db:BIDid:76340

Trust: 2.0

db:EXPLOIT-DBid:38137

Trust: 1.1

db:SECTRACKid:1033276

Trust: 1.1

db:JVNid:JVNVU94440136

Trust: 0.8

db:JVNDBid:JVNDB-2015-004299

Trust: 0.8

db:CNNVDid:CNNVD-201508-267

Trust: 0.7

db:ZDIid:ZDI-15-390

Trust: 0.3

db:PACKETSTORMid:133549

Trust: 0.1

db:VULHUBid:VHN-83745

Trust: 0.1

sources: VULHUB: VHN-83745 // BID: 76340 // JVNDB: JVNDB-2015-004299 // CNNVD: CNNVD-201508-267 // NVD: CVE-2015-5784

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/76340

Trust: 1.7

url:https://support.apple.com/kb/ht205031

Trust: 1.7

url:https://www.exploit-db.com/exploits/38137/

Trust: 1.1

url:http://www.securitytracker.com/id/1033276

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5784

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94440136/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5784

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-390/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00004.html

Trust: 0.3

url:https://support.apple.com/en-ie/ht205031

Trust: 0.3

sources: VULHUB: VHN-83745 // BID: 76340 // JVNDB: JVNDB-2015-004299 // CNNVD: CNNVD-201508-267 // NVD: CVE-2015-5784

CREDITS

An anonymous researcher working with HP's Zero Day Initiative, Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team, Maxime VILLARD of m00nbsd, Ryan Pentney and Richard Johnson of Cisco Talos, Xiaoyong Wu of the Evernote Security Team, JieTao Yang of KeenTeam

Trust: 0.6

sources: CNNVD: CNNVD-201508-267

SOURCES

db:VULHUBid:VHN-83745
db:BIDid:76340
db:JVNDBid:JVNDB-2015-004299
db:CNNVDid:CNNVD-201508-267
db:NVDid:CVE-2015-5784

LAST UPDATE DATE

2024-11-23T19:24:57.568000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-83745date:2017-09-21T00:00:00
db:BIDid:76340date:2016-07-05T21:35:00
db:JVNDBid:JVNDB-2015-004299date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-267date:2015-08-24T00:00:00
db:NVDid:CVE-2015-5784date:2024-11-21T02:33:50.340

SOURCES RELEASE DATE

db:VULHUBid:VHN-83745date:2015-08-17T00:00:00
db:BIDid:76340date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004299date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-267date:2015-08-18T00:00:00
db:NVDid:CVE-2015-5784date:2015-08-17T00:01:12