Vulnerability Name:
CVE-2008-1517 (CCN-50489)
Assigned:
2008-03-25
Published:
2009-05-12
Updated:
2017-08-08
Summary:
Array index error in the xnu (Mach) kernel in Apple Mac OS X 10.5 before 10.5.7 allows local users to gain privileges or cause a denial of service (system shutdown) via unspecified vectors related to workqueues.
CVSS v3 Severity:
9.3 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
7.2 High
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
)
5.3 Medium
(Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
6.9 Medium
(CCN CVSS v2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
)
5.1 Medium
(CCN Temporal CVSS v2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Medium
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-20
Vulnerability Consequences:
Gain Privileges
References:
Source: MITRE
Type: CNA
CVE-2008-1517
Source: IDEFENSE
Type: UNKNOWN
20090514 Apple Mac OS X xnu Kernel workqueue_additem/workqueue_removeitem Index Validation Vulnerability
Source: APPLE
Type: Patch, Vendor Advisory
APPLE-SA-2009-05-12
Source: CCN
Type: SA35074
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
Source: SECUNIA
Type: UNKNOWN
35074
Source: CCN
Type: SECTRACK ID: 1022213
Mac OS X Kernel Workqueue Index Bug Lets Local Users Gain System Privileges
Source: CCN
Type: Apple Web site
About the security content of Security Update 2009-002 / Mac OS X v10.5.7
Source: CONFIRM
Type: Patch, Vendor Advisory
http://support.apple.com/kb/HT3549
Source: CCN
Type: OSVDB ID: 54453
Apple Mac OS X Kernel workqueue Index Handling Local Privilege Escalation
Source: CCN
Type: BID-34926
RETIRED: Apple Mac OS X 2009-002 Multiple Security Vulnerabilities
Source: CCN
Type: BID-34959
Apple Mac OS X Kernel Workqueue Local Privilege Escalation Vulnerability
Source: SECTRACK
Type: UNKNOWN
1022213
Source: CERT
Type: US Government Resource
TA09-133A
Source: VUPEN
Type: UNKNOWN
ADV-2009-1297
Source: XF
Type: UNKNOWN
macos-kernel-workqueue-code-execution(50489)
Source: XF
Type: UNKNOWN
macos-kernel-workqueue-code-execution(50489)
Source: CCN
Type: iDefense PUBLIC ADVISORY: 05.14.09
Apple Mac OS X xnu Kernel workqueue_additem/workqueue_removeitem Index Validation Vulnerability
Vulnerable Configuration:
Configuration 1
:
cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
apple
mac os x 10.5
apple
mac os x 10.5.0
apple
mac os x 10.5.1
apple
mac os x 10.5.2
apple
mac os x 10.5.3
apple
mac os x 10.5.4
apple
mac os x 10.5.5
apple
mac os x 10.5.6
apple
mac os x server 10.5
apple
mac os x server 10.5.0
apple
mac os x server 10.5.1
apple
mac os x server 10.5.2
apple
mac os x server 10.5.3
apple
mac os x server 10.5.4
apple
mac os x server 10.5.5
apple
mac os x server 10.5.6
apple
mac os x 10.5
apple
mac os x server 10.5
apple
mac os x 10.5.1
apple
mac os x server 10.5.1
apple
mac os x 10.5.2
apple
mac os x server 10.5.2
apple
mac os x server 10.5.3
apple
mac os x 10.5.3
apple
mac os x 10.5.4
apple
mac os x server 10.5.4
apple
mac os x 10.5.5
apple
mac os x server 10.5.5
apple
mac os x 10.5.6
apple
mac os x server 10.5.6