The kernel in Apple Mac OS X 10.4 through 10.4.10 does not reset the current Mach Thread Port or Thread Exception Port when executing a setuid program, which allows local users to execute arbitrary code by creating the port before launching the setuid program, then writing to the address space of the setuid process.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/38466 | vdb entry third party advisory |
http://www.securityfocus.com/bid/26444 | vdb entry third party advisory broken link |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630 | third party advisory broken link |
http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html | mailing list vendor advisory |
http://docs.info.apple.com/article.html?artnum=307041 | broken link |
http://www.vupen.com/english/advisories/2007/3868 | vdb entry broken link vendor advisory |
http://secunia.com/advisories/27643 | broken link third party advisory vendor advisory |
http://www.us-cert.gov/cas/techalerts/TA07-319A.html | us government resource third party advisory broken link |