Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2006-4392

The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 76.6%
CVSS Severity
CVSS v2 Score 7.2
References
Products affected by CVE-2006-4392
  • Apple » Mac Os X » Version: 10.4
    cpe:2.3:o:apple:mac_os_x:10.4
  • Apple » Mac Os X » Version: 10.4.1
    cpe:2.3:o:apple:mac_os_x:10.4.1
  • Apple » Mac Os X » Version: 10.4.2
    cpe:2.3:o:apple:mac_os_x:10.4.2
  • Apple » Mac Os X » Version: 10.4.3
    cpe:2.3:o:apple:mac_os_x:10.4.3
  • Apple » Mac Os X » Version: 10.4.4
    cpe:2.3:o:apple:mac_os_x:10.4.4
  • Apple » Mac Os X » Version: 10.4.5
    cpe:2.3:o:apple:mac_os_x:10.4.5
  • Apple » Mac Os X » Version: 10.4.6
    cpe:2.3:o:apple:mac_os_x:10.4.6
  • Apple » Mac Os X » Version: 10.4.7
    cpe:2.3:o:apple:mac_os_x:10.4.7
  • Next » Openstep » Version: 4.1
    cpe:2.3:o:next:openstep:4.1


Contact Us

Shodan ® - All rights reserved